期刊文献+

基于AdHoc网络通信协定协议研究

Based on the Research of the Ad Hoc Network Protocol Agreement
下载PDF
导出
摘要 Ad Hoc网络的关键技术是路由技术,对网络整体性能产生着最重要的影响,针对Ad Hoc网络动态变化的拓扑结构,原有固定网络中的路由协议已经能满足其需要,要求必须对新的Ad Hoc路由协议进行设计。基于Ad Hoc网络的基本概念,以双线性对和层次路由协议为基础,提出ad hoc网络中通信有效的密钥协定协议,对应逻辑密钥协定模型与实际网络拓扑结构,使建立和动态更新初始群密钥得到了支持,具有较小的通信量。实验和性能分析后得知,针对有较大的范围、较强的设备处理能力,而较差的通信环境而言,提出的协议效果非常好。 Routing technology is a key technology of the Ad Hoc network, and it is also one of the most important factors that affect the performance of the network as a whole. As the routing protocols in the traditional fixed networks no longer adapt to the dynamic changes in the topology of Ad Hoc Networks, new Ad Hoc routing protocols must be redesigned. Starting from the basic concept of the Ad Hoc network, an ad hoc network communication effective key agreement protocol based on bilinear pairings and hierarchical routing protocols is proposed. It supports the establishment and dynamic update of initial group secret key and has less traffic that corresponds to the logical key agreement model and actual network topology. The experiment and performance analysis show that the proposed protocol is very effective in the situation of large range, strong ability of equipment processing and poor network communication environment.
作者 杨诚 詹永照
出处 《微型电脑应用》 2015年第4期8-11,18,共5页 Microcomputer Applications
基金 国家自然科学基金项目(61202474)
关键词 AD HOC网络 密钥协定 层次路由 双线性对 Ad hoc Networks Key Agreement Hierarchical Routing Bilinear Pairings
  • 相关文献

参考文献5

二级参考文献47

  • 1李建东,黄振海,铁满霞.用于Ad hoc网络的鉴别路由协议及性能分析[J].计算机应用,2005,25(9):2066-2069. 被引量:2
  • 2熊志强,黄佳庆,刘威,杨宗凯.无线网络编码综述[J].计算机科学,2007,34(3):6-9. 被引量:23
  • 3彭木根,王月新,王文博.无线自组织网络的网络编码技术[J].中兴通讯技术,2007,13(4):56-60. 被引量:8
  • 4DENG H, MUKHERJEE A, AGRAWAL D P. Threshold and identity-based key management and authentication for wireless Ad Hoc networks [ C]// ITCC'04: Proceedings of 2004 International Conference on Information Technology: Coding and Computing. Piscataway: IEEE Press, 2004:107-110.
  • 5BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[C]//Advances in Cryptology - Asiacrypt 2001, LNCS 2248. Berlin: Springer-Verlag, 2001:514 -532.
  • 6OSTROVSKY R, YUNG M. How to withstand mobile virus attacks [C]// Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1991:51 -59.
  • 7LUO H, ZEFROS P, KONG J, et al. Self-securing Ad Hoc wireless networks [ C]//ISCC'02: Proceeding of the Seventh IEEE Symposi- um on Computers and Communications. Piscataway: IEEE Press, 2002:548 - 555.
  • 8KONG J, ZEFROS P, LUO H, et al. Providing robust and ubiquitous security support for mobile Ad-Hoc networks [ C]// ICNP'01: Proceeding of the 9th International Conference on Network Protocols. Piscataway: IEEE Press, 2001:251 - 260.
  • 9LUO H, KONG J, ZERFOS P, et al. Ubiquitous and robust access control for mobile Ad Hoc networks [J]. ACM Transactions on Net- working, 2004, 12(6) : 1049 - 1063.
  • 10KHALILI A, KATZ J, ARBAUGH W A. Toward secure key distribution in truly Ad-Hoc networks [C]// SAINT'03: Proceedings of the Symposium on Applications and the Intemet Workshops. Piscataway: IEEE Press, 2003:342-346.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部