期刊文献+

基于ECC的移动自组网成员控制方案

Member Control Scheme of Mobile Ad Hoc Networks Based on ECC
在线阅读 下载PDF
导出
摘要 基于Pederson分布式密钥产生方案,采用椭圆曲线密码体制提出一个分布式密钥产生协议,该方案高效且能抵制内外恶意节点的攻击,并采用门限数字签名方案给出一个安全的移动自组网的成员控制方案.通过方案的性能和安全性分析得出结论,该成员控制策略非常适合于资源受限的移动自组网. A distributed key generation protocol is proposed by ECC based on Peterson distributed key generation scheme, which can resist malicious attack of outer or inner node. A secure member control sekeme is also proposed by using threshold digital sisgnature. By analyzing the scheme's performance and security, a conclusion is drawn that the member control policy is suitable for mobile Ad Hoc networks of limited resource devices.
出处 《武汉理工大学学报(交通科学与工程版)》 2012年第5期1028-1031,共4页 Journal of Wuhan University of Technology(Transportation Science & Engineering)
关键词 椭圆曲线密码体制 门限数字签名 移动自组网络 秘密共享 eclipse curve cryptography threshohd digital signature mobile Ad Hoc networks secret sharing
  • 相关文献

参考文献7

二级参考文献34

  • 1宋莹,高雪松,季晓勇.CPLD在DSP系统中的应用设计[J].电子技术应用,2004,30(8):65-66. 被引量:7
  • 2刘双根,李萍,胡予濮.椭圆曲线密码中标量乘算法的改进方案[J].计算机工程,2006,32(17):28-29. 被引量:7
  • 3胡华平,胡光明,董攀,陈新.大规模移动自组网络安全技术综述[J].计算机研究与发展,2007,44(4):545-552. 被引量:13
  • 4Qiu Qizhi, Xiong Qianxing. Research on Elliptic Curve Cryptograph[C]//The 8th International Conference on Computer Supported Cooperative Work in Design Proceedings. 2004: 698-701.
  • 5Rahim Ali. Elliptic Curve Cryptography A New Way for Encryption[ C]//International Symposium on Biometric and Security Technologies. 2008: 1-5.
  • 6Wang Bangju, Zhang Huanguo, Wang Yuhua. An Efficient Elliptic Curves Scalar Multiplication for Wireless Network[ C]// 2007 IFIP Intermational Conference on Network and Parallel Computing Workshops. 2007: 131-134.
  • 7Mohamed A Fayed, Watheq M, Fayez Gebali. A High-speed, High-radix, Processor Array Architecture for Real-time Elliptic Curve Cryptography over GF(2m)[ C]//2007 IEEE International Symposium on Signal Processing and Information Technology. 2007: 56-61.
  • 8Zhu S,Setia S,Xu S H,et al.GKMPAN:An efficient group rekeying scheme for secure multicast in ad-hoc networks[J].Journal of Computer Security,2006,14(4):301-325.
  • 9Ateniese G,Steiner M,Tsudik G.Authenticated group key agreement and friends[C] //Proc of the 5th ACM Conf on Computer and Communications Security.New York:ACM,1998:17-26.
  • 10Basagni S,Herrin K,Bruschi D.Secure pebblenets[C] //Proc of the 2001 ACM Int Symp on Mobile Ad Hoc Networking and Computing.New York:ACM,2001:156-163.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部