期刊文献+

依赖半径的大规模Adhoc网络群密钥管理方案 被引量:1

Performance depended on radius group key management for large Ad hoc networks
在线阅读 下载PDF
导出
摘要 针对效率依赖网络规模的群密钥管理方案在大规模Ad hoc网络中非均衡,在更新时延威胁前向安全性这一问题,设计了性能优化的群密钥管理方案,通过跳数对网络分层,层中建立完全子图和星形子图,选择和设计性能相同的常数轮协议协商和管理群密钥,协议复杂度与网络半径相关。理论分析和仿真实验证明该方案更适合大规模Ad hoc网络。 Group key management schemes whose efficiency is based on network scale are not adapted to the large scale Ad hoc networks, and threat the forward security during key updating because the efficiency of group key management is not bal- ance among clusters whose scales are not same. To deal with the problem, this paper designed the performance optimization group key management (POGKM) scheme. It divided the larger scale Ad hoc network into multi clusters by two kinds of topol- ogies including complete sub-graph and star sub-graph, and built multilayer with hop count. To get the same efficiency of group key management in complete sub-graph and star sub-graph constant rounds, it designed and selected group key protocols. The efficiency complexity of POGKM was relatied to the network radius. At last, theory analysis and experimental verification prove POGKM is more appropriate to the large scale Ad hoc network than other schemes, especially Ad hoc networks having short radius and high density.
作者 周健 周贤伟
出处 《计算机应用研究》 CSCD 北大核心 2013年第3期878-881,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60773074) 国家"863"计划资助项目(2007AA01Z213 2009AA01Z209) 安徽省高等学校自然科学研究项目(KJ2010B005) 安徽省高校优秀青年人才基金资助项目(2009SQRZ084)
关键词 大规模 AD HOC网络 群密钥管理 网络半径 安全 large scale Ad hoc network group key management network radius security
  • 相关文献

参考文献20

  • 1CHLAMTAC I,CONTI M,LIU J J N. Mobile Ad hoc networking:im-peratives and challenges[ J]. Ad hoc Networks ,2003,1 ( 1 ) : 13-64.
  • 2PERKINS C E. Ad hoe networking [ M ]. [ S. 1. ] : Addison Wesley Professional, 2000.
  • 3INGEMARSSON I, TANG D, WONG C, A conference key distribution system[ J]. IEEE Trans on Information Theory, 1982,28 (5) :714- 720.
  • 4YANG Hap, LOU Hai-yan, YE Fan, et al, Security in mobile Ad hoc networks:challenges and solutions[ J]. IEEE Wireless Communica- tions,2004,1I ( 1 ) :38-48.
  • 5KIM Y, PERRIG A,TSUDIK G. Group key agreement efficient in com- munication[ J ]. IEEE Trans of Computers ,2004,53 (7) :905- 921.
  • 6KIM Y,PERRIG A, TSUDIK G,Tree-based group key agreement[ J]. ACM Trans on Information System Securily,2004,7( 1 ) :60-96.
  • 7LIAO Li-jun, MANULIS M. Tree-based group key agreement framework for mobile Ad hee networks [ J ] . Future Generation Computer Systems,2007,23(6) :787-803.
  • 8DUURSMA I,LEE H. A group key agreement protocol from pairings [ J ]. Applied Mathematics and Computations, 2005,167 ( 2 ) : 1451-1456.
  • 9HIETALAHTI M. A clustering-based group key agreement protocol for Ad hoc networks [ J]. Electronic Notes in Theoretical Computer Science,2008,192 (2) :43-53.
  • 10WANG Nen-Chung,FANG Shian-Zhang. A hierarchical key manage- ment scheme for secure group communications in mobile Ad Hoc net- works[ J ]. The Journal of Systems and Software, 2007,80 (1) : 1667-1677.

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部