期刊文献+

基于可信计算的Ad Hoc网络直接匿名证明

Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing
下载PDF
导出
摘要 现有的Ad Hoc网络完整性认证存在固有的缺陷,且用于传统固定网络的安全认证策略不能适用于Ad Hoc网络完整性认证。因此,文中在研究Ad Hoc网络特点的基础上,将可信计算和直接匿名证明理论引入Ad Hoc网络认证环节中。Ad Hoc网络安全认证的关键在于对其中各个节点的安全认证,文中在对各个节点认证之前先进行优化。首先在应用硬件层面上建立可信计算平台模块,其次在软件层面上建立直接匿名证明模块,从而实现Ad Hoc网络节点认证环节的优化。实际应用表明,文中提出的方案有效解决了Ad Hoc节点的安全性问题,降低了Ad Hoc网络受攻击的可能性。 The integrity authentication of the existing Ad Hoc networks has inherent defects, and the traditional fixed network security strategy is not appropriate for the integrity authentication of Ad Hoc networks. Therefore, based on the study about the features of Ad Hoc networks,introduce trusted computing and direct anonymous attestation theory into authentication of Ad Hoe networks. The crux of the security authentication for Ad Hoc networks is the security authentication for every node. Optimize the nodes before the authentication. Firstly, constitute trusted computing module on hardware level, and direct anonymous attestation module on software level. The application shows that this scheme can effectively solve security issues of the Ad Hoc nodes,thus declining the attacked possibility of the Ad Hoc net- works.
出处 《计算机技术与发展》 2014年第4期147-150,共4页 Computer Technology and Development
基金 中央高校基础研究项目(2013G1240118) 国家"863"高技术发展计划项目(2012AA112312) 交通运输部项目(2012-364-208-600 2012-364-208-200 201231849A70) 吉林省外国专家局项目(2012-7-102-2)
关键词 可信计算 Ad Hoc网络 直接匿名证明 零知识证明 trusted computing Ad Hoc networks direct anonymous attestation zero-knowledge proof
  • 相关文献

参考文献15

  • 1Abraham J. A survey of intrusion detection for ad-hoc network [ J ]. Journal of global research in computer science, 2013,4 (4) :182-185.
  • 2Noorman J, Agten P, Daniets W, et al. Saneus : Low-cost trust- worthy extensible networked devices with a zero-software trus- ted computing base [ C ]//Proc of 22nd USENIX security sym- posium. [ s. 1. ]: [ s. n. ] ,2013.
  • 3Brickell E F F, Li J. Apparatus and method for direct anony- mous attestation from bilinear maps : U. S. , 20,130,080,771[ P]. 2013-03-28.
  • 4Deodi P, Shrivastava S, Bhatele M. Seetarity issues in monito- ring medical disease through vehicular Ad Hoe network [ C ]// Proceedings of all India seminar on biomedical engineering 2012 ( AISOBE 2012 ). India : Springer,2013 : 147-152.
  • 5金伟,刘方爱,王晓洁.基于NS的Ad hoc网络路由协议仿真研究[J].计算机技术与发展,2010,20(1):63-66. 被引量:7
  • 6沈奔,秦军,万丽.无线Ad Hoc网络中AODV路由算法的研究与改进[J].计算机技术与发展,2011,21(3):150-153. 被引量:28
  • 7Kale M R A, Gupta S R, Prmit R B. An overview of Manet Ad Hoc network [ J ]. International journal of computer science and applications ,2013,6 ( 2 ) :223-227.
  • 8Barton M, Kwon T J. Security method for mobile Ad Hoe net- works with efficient flooding mechanism using layer independ- ent passive clustering ( LIPC ) : U. S. , 20,130,145,461 [ P ]. 2013-06-06.
  • 9李奕男,钱志鸿,刘影,张旭.基于博弈论的移动Ad hoc网络入侵检测模型[J].电子与信息学报,2010,32(9):2245-2248. 被引量:12
  • 10刘孜文,冯登国.基于可信计算的动态完整性度量架构[J].电子与信息学报,2010,32(4):875-879. 被引量:47

二级参考文献78

  • 1徐静.无线Ad hoc网络路由协议比较[J].广西通信技术,2004(2):29-32. 被引量:5
  • 2吴东亚,侯朝桢,侯紫峰.Multipath Source Self Repair Routing Algorithm for Mobile Ad Hoc Networks[J].Journal of Beijing Institute of Technology,2005,14(2):135-139. 被引量:2
  • 3马健丽.移动Ad hoc网络的NS仿真[J].计算机工程,2005,31(B07):176-177. 被引量:4
  • 4Royer E M. A Review of Current Routing Protocols for Ad Ho e Mobile Wireless Networks[J ]. IEEE Personal Communication, 1999,4(2) :46 - 55.
  • 5Perkins C E, Bhagwat P. Highly Dynamic Destination - Sequenced Distance- Vector Routing (DSDV) for Mobile Computers[ J ]. ACM SIGCOMM, 1994,24 (4) : 234 - 244.
  • 6Johnson D B, Maltz D A. Dynamic Source Routing in Ad Hoc wireless networks[ M] // Mobile Computing. Norwell: Kluwer Academic Publishers, 1996:153 - 181.
  • 7Perkins C E, Royer E M, Das S R. Ad hoc on- demand distanee vector (AODV) Routing [ EB/OL ]. 2003. http:// www. ietf. org/rfc/rfc3561.
  • 8Fall K,Varaclhan K. The NS Manual[N]. [s. l. ] ,UC Berkeley Press, 2007.
  • 9Trusted Computing Group. TCG PC client specific implementation specification for conventional bios version 1.2, July 2005.
  • 10Apvrille A, Gordon D, Hallyn S, Pourzandi M, and Roy V. DigSig: Run-time authentication of binaries at kernel Level[C]. Proceedings of LISA '04 Eighteenth Systems Administration Conference. Atlanta, GA, USENIX Association November, 2004: 59-66.

共引文献116

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部