期刊文献+

基于簇的ad hoc网络密钥管理方案 被引量:4

Cluster-based key management scheme for ad hoc networks
下载PDF
导出
摘要 将自认证公钥的概念和组合公钥的思想相结合,为ad hoc网络提出了一种新的门限密钥分发方案,在此基础上,和"簇"的组网方式结合,提出一种完整的密钥管理方案。该方案公钥自身具有认证功能,不需要证书管理,密钥分发过程简单,消除了IBE(identity-based encryption)方案中存在的密钥托管问题。方案能够灵活地适应ad hoc网络动态拓扑性,适用于各种规模的网络。理论和仿真分析表明,该方案计算量和通信量都比较小,与PKI、IBE方案相比,具有更高的安全性和实用性。 A new threshold key distribution scheme basing on self-certified public key and CPK (composite public key) technology was presented for ad hoc networks. Basing on the key distribution scheme and cluster networks structure, an integrated key management scheme was presented. The public key can be certified itself and so the certificate is not need in the scheme. The process of key distribution is simple and the key escrow problem existing in IBE (identity-based en- cryption) scheme is solved. The scheme can be used in different scale networks and can meet the dynamic topology of the ad hoc networks. The experimental results and theoretical analysis show that the overhead of computation and communication is lower. Comparing with PKI and IBE scheme the scheme is more secure and practical.
出处 《通信学报》 EI CSCD 北大核心 2008年第10期223-228,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60672102) 北京电子科技学院重点实验室基金项目(YZDJ0710)~~
关键词 ad HOC网络 密钥管理 自认证公钥 组合公钥 ad hoc networks key management self-certified key CPK cluster
  • 相关文献

参考文献13

  • 1BASAGNI S, HERRIN K. Secure pebblenets[A]. The 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing[C]. New York: ACM Press, 2001, 156-163.
  • 2ELHDHILI M E, AZZOUZ L B, KAMOUN F. A totally distributed cluster based key management model for ad hoc networks[A]. The Third Annual Mediterranean Ad Hoc Networking Workshop[C]. Bedrum, Turkey: IEEE Computer Society, 2004. 27-30.
  • 3BECHLER M, HOF H J, KRAFT D, et al. A cluster-based security architecture for ad hoc networks[A]. In: 23rd Annual Joint Conference of the IEEE Computer and Communication% Societies (INFOCOM '04)[C]. Hong Kong, 2004. 2393-2403.
  • 4GIRAULT M. Self-certified public keys[A]. Advances in Cryptology, EUROCRYPT '91[C]. New York: Springer-Verlag, 1991.490-497.
  • 5PETERSEN H, HORSTER E Self-certified keys -concepts and application[A]. Third Conference on Communication and Multimedia Security[C]. Athens: Chapman & Hall, 1997. 102-116.
  • 6唐文,南相浩,陈钟.基于椭圆曲线密码系统的组合公钥技术[J].计算机工程与应用,2003,39(21):1-3. 被引量:25
  • 7PEDERSEN T E A threshold cryptosystem without a trusted party[A]. Advances in Cryptology-Eurocrypt'91[C]. New York: Springer- Verlag, 1991. 522-526.
  • 8HORSTER P, MICHELS M, PETERSEN H. Meta-EIGamal signature schemes[A]. Proceedings of the 2nd Annual ACM Conference on Computer and Communications Security[C]. ACM Press, 1994. 96-107.
  • 9ZHOU L, HAAS Z J. Securing ad hoc networks[J]. IEEE Network Journal, 1999, 13(6): 24-30.
  • 10KONG J, ZERFOS P, LUO H, et al. Providing robust and ubiquitous security support for mobile ad-hoc networks[A]. The Ninth International Conference on Network Protocols (ICNP'01)[C]. Washington: IEEE Computer Society, 2001.251-260.

二级参考文献3

  • 1南相浩 唐文 余嘉宁.ECC组合公钥[A]..中国计算机学会信息保密专业委员会论文集:第11卷[C].,2001-09..
  • 2N Koblitz.Elliptic curve cryptosystems[J].Mathematics of Computation, 1987 ;48 : 203-209.
  • 3V Miller.Uses of elliptic curves in cryptography[C].In:Advances in Cryptology-Crypto'85 ,LNCS 218,1986:417,426.

共引文献30

同被引文献35

  • 1张胜,徐国爱,胡正名,杨义先.Ad hoc网络信任模型的研究[J].计算机应用研究,2005,22(12):100-102. 被引量:6
  • 2许峰,谢冬莉,黄皓,王志坚.一个基于权限的移动自组网门限信任模型[J].计算机应用,2006,26(3):574-576. 被引量:2
  • 3王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案[J].软件学报,2006,17(8):1811-1817. 被引量:18
  • 4Girault M.Self-certified Public Keys[C] //Proc.of Advances in Cryptology-EUROCRYPT'91.[S.1.] :Springer-Verlag,1991:491-497.
  • 5Johann van der M,Dawoud D,McDonald S.Trustworthy Key Management for Mobile Ad Hoc Networks[C] //Proc.of SATNAC'04.Western Cape,South Africa:[s.n.] ,2004.
  • 6Pedersen T P.Distributed Provers with Application to Undeniable Signatures[C] //Proc.of Advances in Cryptology-EUROCRYPT'91.[S.1.] :Springer-Verlag,1991:221-242.
  • 7YARSHNEY U. Multicast 'over wireless networks [ J ]. Communica- tions of the ACM,2002,45(12) :31-37.
  • 8ZHOU L D, HAAS Z J. Securing Ad hoc networks [ J]. IEEE Net- work Special Issue on Network Security,1999,13(6) :24-30.
  • 9ASOKAN N, GINZBOORG P. Key agreement in Ad hoc networks [ J 1. Computer Communications,2000,23 ( 17 ) : 1627-1637.
  • 10HIETALAHTI M. Efficient key agreement for Ad hoc networks [ D ]. Espoo: Helsinki University of Technology,2001.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部