期刊文献+

一种新的移动Ad Hoc网络门限式密钥共享认证方案

A new threshold key sharing authentication for mobile Ad Hoc network
下载PDF
导出
摘要 门限式密钥共享认证已成为目前MANET的分布式认证技术的热点所在。深入分析了当前主流的几种门限式密钥共享认证方案,通过分析比较各自的优劣特性,得出了一种全新的认证体系。新的方案不仅弥补了原有方案的不完全分布式特性,更通过周期性密钥更新进一步提高了系统安全性。仿真结果表明,该方案具有高效率的性能和较高的安全级别,并具有良好的可扩展性。 Threshold key sharing authentication has become a hot research topic in MANET's distributed authentication techniques, In this paper, in-depth analysis of several prevailing threshold key sharing authentication schemes is made. By analyzing their respective strengths and weaknesses, this paper arrived at a brand new authentication system. The new scheme will not only make up for the non-fully distribution characteristic in those original schemes, but also further enhance the security of the system through periodical update of keys.Simulation results show that the new scheme is highly efficient in performance, of higher security level, and has good expandability.
作者 张一中
出处 《信息技术》 2007年第12期84-89,共6页 Information Technology
关键词 移动AD HOC网络 密钥共享 门限机制 密钥更新 mobile Ad Hoe network key sharing threshold scheme key update
  • 相关文献

参考文献11

  • 1CLIFFORD NEUMAN B, THEODORE TS'O. Kerberos: An Authentication Service for Computer Networks [ J ]. IEEE Communications, 1994,32(9) :33 - 38.
  • 2RFC 2527, Internet X. 509 Public Key Infrastructure:Certificate Policy and Certification Practices Framewolk[ M ]. 1999.
  • 3DANIEL KRAFT, et al. Distributed Access Control for Consumer Operated Mobile Ad-hoc Netwolks. Proceedings of the 1st IEEE Consumer Communication and Networking Conference ( CCNC' 2004 ) [ C ]. January 2004, Las Vegas, Nevada, USA.
  • 4ARAM KHALILI, JONATHAN KATZ, WILLIAM A ARBAUGH. Toward Secure Key Distribution in Truly Ad-Hoc Netwolks[C]. Proceedings of the 2003 Symposium on Applications and the Internet Wolkshops (SAINT-w'03), IEEE 2003.
  • 5JIEJUN KONG, HAIYUN LUO, et al. Adaptive Security for Multilayer Ad-hoc Netwolks[C]//ACM/IEEE MSWiM, 1999:53-60.
  • 6AJIEJUN KONG, MARIO GERLA. Providing Seal-time Security Support for Multi-level Ad Hoc Networks[C]//IEEE MILCOM, 2000.
  • 7HAIYUN LUO, SONGWU LU. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks[C]//Proc. IEEE INFOCOM, 2003.
  • 8JIEJUN KONG, PETROS ZERFOS, HAIYUN LUO, et al. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks[C]//Proceedings of the ninth International Conference on Network Protocols (ICNP) 2001, Riverside, CA, Nov. 2001:41 - 46.
  • 9RSA standard[S/OL]. http://www.rsasecurity.com/rsalabs/pkcs/pkes- 1/index. html.
  • 10Diffie W, Hellman' s M E. New directions in cryptography from IEEE transactions on Information Theory [ J ]. 1976,IT22: 644 - 654.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部