高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

无线Ad hoc网动态密钥管理问题的研究

傅坚 张翎

傅坚, 张翎. 无线Ad hoc网动态密钥管理问题的研究[J]. 电子与信息学报, 2006, 28(5): 815-819.
引用本文: 傅坚, 张翎. 无线Ad hoc网动态密钥管理问题的研究[J]. 电子与信息学报, 2006, 28(5): 815-819.
Fu Jian, Zhang Ling. The Research on the Dynamic Key Management of Wireless Ad hoc Network[J]. Journal of Electronics & Information Technology, 2006, 28(5): 815-819.
Citation: Fu Jian, Zhang Ling. The Research on the Dynamic Key Management of Wireless Ad hoc Network[J]. Journal of Electronics & Information Technology, 2006, 28(5): 815-819.

无线Ad hoc网动态密钥管理问题的研究

The Research on the Dynamic Key Management of Wireless Ad hoc Network

  • 摘要: 作为一类自组织动态网络,无线Ad hoc网面临着严重的安全威胁。该文在分析Ad hoc网络特点的基础上,提出一种基于扩展Diffie-Hellman交换的分级组密钥管理方案(HGKM)。HGKM协议采用分级架构,利用成员过滤函数维护统一的组密钥,有效减少密钥更新对Ad hoc网性能的影响。
  • Stajano F, Anderson R. The resurrecting duckling: security issuesfor Ad-hoc wireless networks. Proceedings of 7PthP InternationalWorkshop on Security Protocols, Berlin Germany,Springer-Verlag, 1999: 172-194.[2]Fordigh M, Johansson P, Larsson P. Wireless Ad hoc networkingthe art of networking without a network. Ericsson Review,2000: 125-131.[3]Charles Perkins, Ad hoc networks. Addison Wesley Editions,2001.[4]Steiner M, Tsudik G, Waidner M. Diffie-Hellman key distributionextended to group communication. 3PrdP ACM Conference onComputer and Communications Security, New Delphi, India,1996: 31-37.[5]Jalel Ben Othman, Xiaoyun Xue. Security equipment in Ad hocnetworks, IEEE VTC 2002: 1819-1823.[6]Mike Burmester, Yvo Desmedt. A secure and efficient conferencekey distribution system[J].Advances in Cryptology-EUROCRYPT94, Perugia, Italy.1994, 950:275-286[7]Klaus Becker, Uta Wille. Communication complexity of groupkey distribution. Proc. 5PthPACM Conference on Computer andCommunications Security, San Francisco, USA, 1998: 1-6.[8]Diffie W, Hellman M. New directions in cryptography. IEEETrans. on Information Theory, 6(1976), 644-654.[9]Kuen-Pin Wu, Shang-Jang Ruan, Feipei Lai, et al.. On keydistribution in secure multicasting. 25PthP Annual IEEE Conferenceon Local Computer Networks, 2000: 208-212.[10]Fengji Ye, Su Yi, Biplab Sikdar. Improving spatial reuse of IEEE802.11 based ad hoc networks. GLOBECOM 200, IEEE GlobalTelecommunications Conference, 2003, 22(1): 1013-1017.[11]Beller M J, Yacobi Y. Fully-fledged two-way public keyauthentication and key agreement for low-cost terminals[J].Electronics Letters.1993, 29(11):999-1001[12]Y. Amir, G Ateniese, D Hasse, et al.. Secure groupcommunication in asynchronous networks with failures:Integration and experiments. IEEE ICDS, 2000: 330-343.
  • 加载中
计量
  • 文章访问数:  2144
  • HTML全文浏览量:  125
  • PDF下载量:  741
  • 被引次数: 0
出版历程
  • 收稿日期:  2004-08-16
  • 修回日期:  2005-06-27
  • 刊出日期:  2006-05-19

目录

    /

    返回文章
    返回