期刊文献+

MANET节点不相交多路径安全源路由协议 被引量:2

Multiple Node-Disjoint Paths Secure Source Routing for MANET
下载PDF
导出
摘要 多路径路由实现是移动Adhoc网络(MANET)可靠运行的有效保证.现有MANET节点不相交多路径路由协议主要关注节点不相交多路径的可实现性和效率问题.针对节点不相交多路径路由协议MNDP协议在主动攻击者安全模型中的安全缺陷,提出了可证明安全的MANET节点不相交多路径动态源路由协议——SMNDP协议.SMNDP协议路由请求算法中,建立了中间节点路由请求消息传播策略的检错机制,SMNDP协议路由应答算法中建立了消息防篡改机制和身份认证机制.基于攻陷的网络拓扑模型,扩展了可模糊路由概念,提出了多路径可模糊路由集合概念和节点不相交多路径源路由协议的安全定义,并应用于SMNDP协议的安全分析.SMNDP协议的安全性可以归约为消息认证码和签名机制的安全性. The implementation of multipath routing provides guarantee for reliable running of mobile Ad hoc network (MANET). Most of existing node-disjoint multipath routing focuses mainly on establishment issues of multiple node-disjoint paths and efficiency issues of identifying multiple node-disjoint paths. Multiple Node-Disjoint Paths (MNDP) has secure faults in the se- cure model of active adversary. To address this issue, a provably Secure Multiple Node-Disjoint Paths source routing (SMNDP) is proposed in this paper. Error-check scheme is used for the transmission of the route quest in the algorithm of route request for SMNDP. In addition, the schemes such as the message authentication and the digital signature are used in the algorithm of route reply for SMNDP. The concept of plausible route is extended in this paper, and the defini- tion of plausible-route set is given. And then, security definition of multiple node-disjoint paths routing is presented. The security of SMNDP can be reduced to the security of the message authentication code and the digital signature.
出处 《计算机学报》 EI CSCD 北大核心 2009年第6期1126-1133,共8页 Chinese Journal of Computers
基金 国家“八六三”高技术研究发展计划项目基金(2007AA01Z429) 国家自然科学基金(60573036,60633020,60702059) 甘肃省自然科学基金(2007GS04823) 兰州理工大学博士基金(BS14200901)资助~~
关键词 MANET MNDP 可证明安全 可模糊路由 SMNDP MANET MNDP provably secure plausible route SMNDP
  • 相关文献

参考文献9

  • 1Liu Chang-Wen, Yarvis Mark, Conner W Steven, Guo Xin- Gang. Guaranteed on-demand discovery of node-disjoint paths in Ad hoe networks. Computer Communications, 2007, 30: 2917-2930
  • 2Hu Y-C, Perrig A, A survey of secure wireless Ad hoc routing. IEEE Security and Privacy Magazine, 2004, 2(3) : 28-39
  • 3Kotzanikolaou Panayiotis, Mavropodi Rosa, Douligeris Christos. Secure multipath routing for mobile Ad hoc networks. Ad Hoc Networks, 2007, 5(1): 87-99
  • 4Papadimitratos P, Haas Z. Secure routing for mobile Ad hoe networks//Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. San Antonio, Texas, 2002:27-31
  • 5Acs G, Buttyan L, Vajda I. Provably secure on-demand source routing in mobile ad hoc networks. International Association for Cryptologic Research, Technical Report 159, 2004
  • 6Acs Gergely, Buttyan Levente, Vajda lstvan. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2006, 5(11): 1533-1546
  • 7冯涛,马建峰.无线传感器网络密钥种子管理和分配模型及应用[J].计算机研究与发展,2008,45(1):146-153. 被引量:7
  • 8Johnson David B, Mahz David A. Dynamic source routing in ad hoc wireless networks. Mobile Computing, 1996, 12 (6) 10-23
  • 9Cormen T H, Leiserson C E, Rivest R L. Introduction to Algorithms. 2nd Edition. Cambridge, MA: The MIT Press, 1993

二级参考文献16

  • 1崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 2刘志宏,马建峰,黄启萍.基于区域的无线传感器网络密钥管理[J].计算机学报,2006,29(9):1608-1616. 被引量:27
  • 3Patrick Tague, Radha Poovendran. A general probabilistic model for improving key assignment in wireless networks [C]. In: Proc of the 4th Int'l Symp on Modeling and Optimization in Mobile, Ad-hoc, and Wireless Networks. Piscataway, NJ: IEEE Press, 2006. 251-259.
  • 4L Eschenauer, V D Gligor. A key-management scheme for distributed sensor networks [C]. In: Proc of the 9th ACM Conf on Computer and Communication security. New York: ACM Press, 2002. 41-47.
  • 5J Newsome, E Shi, D Song, et al. The Sybil attack in sensor networks: Analysis & defenses [C]. In: Proc of the 3rd Int'l Syrup on Information Processing in Sensor Networks. New York: ACM Press, 2004. 259-268.
  • 6H Chan, A Perrig, D Song. Random key pre-distribution schemes for sensor networks [C]. In: Proc of the 2003 IEEE Syrup on Security and Privacy (SP 2003) . Piscataway, NJ: IEEE Press, 2003. 197-213.
  • 7Tyler Moore. A collusion attack on pair-wise key Predistribution schemes for distributed sensor networks [C]. IEEE Personal Communications Workshops, Pisa, 2006.
  • 8J Benaloh, M de Mare. One-way accumulators: A decentralized alternative to digital signatures [C]. In: Advances in Cryptology-Eurocrypt ' 93, LNCS 765. Berlin: Springer- Verlag, 1993. 274-285.
  • 9R Canetti. Universally composable security : A new paradigm for cryptographic protocols [C] . In: Proc of the 42nd IEEE Syrup on the FOCS. Piscataway, NJ: IEEE Press, 2001. 136-145.
  • 10K Nyberg. Fast accumulated hashing [C]. In: Proc of the 3rd Fast Software Encryption Workshop. Berlin: Springer-Verlag, 1996. 83-87.

共引文献6

同被引文献11

  • 1陈晶,崔国华,洪亮,付才.一种Ad Hoc网络中的安全匿名按需路由协议[J].计算机科学,2007,34(1):29-33. 被引量:8
  • 2Johnson D B,Maltz D A.Dynamic Source Routing in Ad Hoc Wireless Networks[J].Mobile Computing,1996,12(6):10-23.
  • 3Perkins C,Royer E.Ad hoc on-demand distance vector routing[J].Mobile Systems and Applications,1999,24(3):59-81.
  • 4Liu Changwen,Yarvis M,Conner W S,et al.Guaranteed On-demand Discory of Node-disjoint Paths in Ad hoc Networks[J].Computer communications,2007,30(14/15):2917-2930.
  • 5Lee S J,Gerla M.SMR:Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks[C] ∥Proceedings of IEEE International Conference on Communications(ICC 2001).2001,10:3201-3205.
  • 6Wu K,Harms J.On-demand multipath routing for mobile ad hoc networks[C] ∥Proceedings of 4th European Personal Mobile Communication Conference(EPMCC 01).Vienna,Austria,February 2001.http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.9938.
  • 7Ye Z,Krishnamurthy S V,Tripathi S K.A Framework for Reliable Routing in Mobile Ad Hoc Net-works[C] ∥Proceedings of Twenty-Second Annual Joint Conference on the IEEE Computer and Communications Societies(IEEE INFOCOM 2003).2003,1:270-280.
  • 8Abbas A M,Jain B N.Path Diminution is Unavoidable in Node-disjoint Multipath Routing in a Single Route Discovery[C] ∥Proceedings of 1st IEEE International Conference on Conumunication Software and Middleware(COMSWARE).2006:1-10.
  • 9Cormen T H,Leiserson C E,Rivest R L.Introduction to Algorithms(Second Edition)[M].Cambridge,MA:The MIT Press,1993.
  • 10阮星华,徐敬东,于博洋.VANET中位置路由协议的安全和隐私保护[J].计算机工程,2008,34(14):166-167. 被引量:5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部