期刊文献+

一种新的基于门限机制的Ad Hoc网络密钥管理方案

A Key Management Scheme Based on Threshold For Ad Hoc Network
在线阅读 下载PDF
导出
摘要 在部分分布式CA模型的基础上,结合门限秘密分享机制和双线性对密码体制,提出了一种新的部分分布式的密钥管理方案。本方案通过路由机制来维护一个特殊的服务器组,使认证请求可以被就近的服务器节点快速响应。仿真结果表明,与无路由的普通方案相比,本方案提高了认证成功率,缩短了证书更新时延,保证了Ad Hoc网络的可用性和安全性。 On the basis of the partial distributed CA model,and combined the threshold secret sharing and bilinear pairings,a new partial distributed key management scheme in Ad Hoc network was proposed.The scheme through routing maintains a special server group to make the certification request be responded fast.Simulation results show that compared with the ordinary scheme without routing,the new scheme boosted the success rate of certification,shorten certification update delay,and improved the availability and security of the Ad Hoc network.
出处 《青岛大学学报(自然科学版)》 CAS 2010年第4期61-64,共4页 Journal of Qingdao University(Natural Science Edition)
关键词 Ad HOC网络 双线性对 密钥管理 路由 Ad Hoc network Bilinear Pairings Key management Routing
  • 相关文献

参考文献5

  • 1Adi Shamir.How to share a secret[J].Communications of the ACM,1979,22(1):612-613.
  • 2Zhou L,Haas Z.Securing ad hoc networks[J].IEEE Network,2000,13(6):24-30.
  • 3Seung Yi,Robin Kravets.MOCA:Mobile Certificate authority for wireless Ad hoc networks[C].IEEE Proc of 2nd Annual PKI Research Workshop Program.Maryland:Gaithersburg,2003.65-79.
  • 4任勇军,王建东,庄毅,方黎明.动态的Ad Hoc网络密钥管理方案[J].南京航空航天大学学报,2007,39(6):810-813. 被引量:1
  • 5洪帆,姜凡,张伟,陈晶,付才.移动Ad Hoc网络中带路由机制的密钥管理[J].计算机工程与科学,2007,29(3):1-3. 被引量:5

二级参考文献21

  • 1Camp T,Boleng J,Davies V.A Survey of Mobility Models for Ad Hoc Network Research[J].Wireless Communication and Mobile Computing,Special Issue on Mobile Ad Hoc Networking:Research,Trends,and Applications,2002,2 (5):483-502.
  • 2Zhou L,Zygmunt J H.Securing Ad Hoc Networks[J].IEEE Network,1999,13(6):24-30.
  • 3Buttyan L,Hubaux J P.Report on a Working Session on Security in Wireless Ad Hoc Networks[J].Mobile Computing and Communications Review,2003,7(1):74-94.
  • 4Desmedt Y,Frankel Y.Threshold Crytosystems[A].Proc of CRrpTO'89[C].307-315.
  • 5Yi S,Kravets R.MOCA:Mobile Certificate Authority for Wireless Ad Hoc Networks[A].Proc of the 2nd Annual PKI Research Workshop Program[C].2003.65-79.
  • 6Ostrovsky R,Yung M.How to Withstand Mobile Virus Attacks[A].Proc of the 10th Annual Symp on Principles of Distributed Computing[C].1999.51-59.
  • 7Panagiotis P, Zygmunt J H. Secure routing for mobile Ad Hoc networks[C]//Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference 2002. San Antonio :Sage Science Press, 2002 : 27-31.
  • 8Feldman P. A practical scheme for non-interactive verifiable secret sharing[C]//Proc of the 28th Annual IEEE Symposium on Foundation of Computer Science. New York:IEEE Computer Society Press, 1987:427-437.
  • 9Macker J, Corson M. Mobile Ad Hoc networking and the IETF[J]. Mobile Computing and Communications Review, 1998,2 (1) : 9-14.
  • 10Zhou L,Hass Z. Securing Ad Hoc networks[J]. IEEE Network Magazine, 1999,13 (6) : 24-30.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部