高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于身份密码的机载自组织网络动态密钥管理

王宏 李建华 赖成喆

王宏, 李建华, 赖成喆. 基于身份密码的机载自组织网络动态密钥管理[J]. 电子与信息学报, 2018, 40(8): 1985-1991. doi: 10.11999/JEIT171148
引用本文: 王宏, 李建华, 赖成喆. 基于身份密码的机载自组织网络动态密钥管理[J]. 电子与信息学报, 2018, 40(8): 1985-1991. doi: 10.11999/JEIT171148
Hong WANG, Jianhua LI, Chengzhe LAI. Identity Based Dynamic Key Management of Airborne Ad Hoc Network[J]. Journal of Electronics & Information Technology, 2018, 40(8): 1985-1991. doi: 10.11999/JEIT171148
Citation: Hong WANG, Jianhua LI, Chengzhe LAI. Identity Based Dynamic Key Management of Airborne Ad Hoc Network[J]. Journal of Electronics & Information Technology, 2018, 40(8): 1985-1991. doi: 10.11999/JEIT171148

基于身份密码的机载自组织网络动态密钥管理

doi: 10.11999/JEIT171148
基金项目: 国家自然科学基金(61401499, 61502386)
详细信息
    作者简介:

    王宏:男,1979年生,博士生,讲师,研究方向为航空自组网信息安全

    李建华:男,1965年生,博士,教授,博士生导师,研究方向为空天信息网络建设

    赖成喆:男,1985年生,博士,副教授,硕士生导师,研究方向为车载网络信息安全

    通讯作者:

    王宏  whongger2017@163.com

  • 中图分类号: TN918

Identity Based Dynamic Key Management of Airborne Ad Hoc Network

Funds: The National Natural Science Foundation of China (61401499, 61502386)
  • 摘要: 针对现有机载自组织网络密钥管理存在的预分配密钥更新困难、公钥证书传递开销大、分布式身份密钥传递需要安全信道的问题,该文提出一种无需安全信道的基于身份密码体制的动态密钥管理方案。该方案包括系统密钥自组织生成和用户私钥分布式管理两个算法;采取遮蔽密钥的办法,确保私钥在公共信道中全程安全传递,使得密钥管理易于部署、方便扩展;最后分析了方案的正确性与安全性。结果证明方案理论正确,能够抵抗假冒、重放、中间人攻击。
  • 图  1  机载自组网密钥管理结构图

    图  2  机载网络自组织系统密钥生成

    图  3  机载网络用户密钥管理

    表  1  性能比较

    方案 F1 F2 F3 F4 F5 F6
    文献[17] $(m - 1)/n$ $4P + (7 + m)M$ $2m$
    文献[18] $1/n$ $3P + (3 + m)M$ $3m$
    文献[19] $\left( {m/2} \right)/n$ $2P + 7M$ ${\rm{4}}m$
    文献[20] $(m - 1)/n$ $6P + (3 + m)M$ $2 + 2m$
    本文方案 $(m - 1)/n$ $6P + (4 + m)M$ $2 + 2m$
    下载: 导出CSV
  • 李杰, 宫二玲, 孙志强, 等. 下一代机载网络技术评述[J]. 指挥与控制学报, 2015, 1(3): 351–356. DOI: JCC.CN.2015.00351.

    LI Jie, GONG Erling, SUN Zhiqiang, et al.. An overview of next generation airborne networks[J]. Journal of Command and Control, 2015, 1(3): 351–356. DOI: JCC.CN.2015.00351.
    梁一鑫, 程光, 郭晓军, 等. 机载网络体系结构及其协议栈研究进展[J]. 软件学报, 2016, 27(1): 96–111.DOI: 10.13328/j.cnki.jos.004925.

    LIANG Yixin, CHENG Guang, GUO Xiaojun, et al.. Research progress on architecture and protocol stack of the airborne network[J]. Journal of Software, 2016, 27(1): 96–111. DOI: 10.13328/j.cnki.jos.004925.
    SHANTHI K and MURUGAN D. Pair-wise key agreement and hop-by-hop authentication protocol for MANET[J]. Wireless Networks, 2016, 23(4): 1–9.DOI: 10.1007/s11276-015-1191-x.
    PHUNG P H and MINH Q T. DASSR: A distributed authentication scheme for secure routing in wireless ad-hoc networks[C]. International Conference on Future Data and Security Engineering. Can Tho, Vietnam, 2016: 219–236.
    DONG Ying, SUI Aifeng, YIU S M, et al.. Providing distributed certificate authority service in cluster-based mobile ad hoc networks[J]. Computer Communications, 2007, 30(11/12): 2442–2452. doi: 10.1016/j.comcom.2007.04.011.
    韩磊, 刘吉强, 赵佳, 等. 移动ad hoc网络分布式轻量级CA 密钥管理方案[J].四川大学学报(工程科学版), 2011, 43(6): 133–139.DOI: 10.15961/j.jsuese.2011.06.021.

    HAN Lei, LIU Jiqiang, ZHAO Jia, et al..Distributed lite CA key management scheme in mobile ad hoc networks[J].Journal of Sichuan University (Engineering Science Edition), 2011, 43(6): 133–139. doi: 10.15961/j.jsuese.2011.06.021.
    DATKO B. Supporting secure, ad hoc joins for tactical networks[R]. Maryland: United States Naval Academy Trident Scholar Project Report, 2002.
    CAPKUN S, NUTTYAN L, and HUBAUX J P. Self-organized public-key management for mobile ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2003, 2(1): 52–64. DOI: 10.1109/TMC.2003.1195151.
    RAFSANJANI M K and SHOJAIEMEHR B. Improvement of self-organized public key management for MANET[J]. Journal of American Science, 2012, 8(1): 197–202.
    JANANI V S and MANIKANDAN M S K. Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks[R]. Sadhana, 2016.
    OMAR M, BOUFAGHES H, MAMMERI L, et al.. Secure and reliable certificate chains recovery protocol for mobile ad hoc networks[J]. Journal of Network & Computer Applications, 2016, 62(C): 153-162. DOI: 10.1016/j.jnca.2016.01.007
    SHAMIR. Identity-based cryptosystems and signature schemes[J]. LNCS, 1984, 21(2): 47–53.DOI: 10.1007/3-540-39568-7 5.
    BONEH D and FRANKLIN M. Identity-based encryption from the weil pairing[C]. International Cryptology Conference on Advances in Cryptology. Santa Barbara, USA, 2001: 213–229.
    曹丹, 王小峰, 王飞, 等. SA-IBE: 一种安全可追责的基于身份加密方案[J].电子与信息学报, 2011, 33(12): 2922–2928.DOI: 10.3724/SP.J.1146.2011.00399.

    CAO Dan, WANG Xiaofeng, WANG Fei, et al.. SA-IBE: A secure and accountable identity-based encryption scheme[J] Journal of Electronics & Information Technology, 2011, 33(12): 2922–2928. doi: 10.3724/SP.J.1146.2011.00399.
    ZHANG Tao, YUE Kang, and YAN Jinkui. A distributed anonymous authentication scheme for mobile ad hoc network from bilinear maps[C]. International Conference on Mechatronic Science, Electric Engineering and Computer. Jilin, China, 2011: 314–318.
    NARAYANA V L and BHARATHI C R. Identity based cryptography for mobile ad hoc networks[J]. Journal of Theoretical and Applied Information Technology, 2017, 95(5): 1173–1182.
    罗长远, 李伟, 邢洪智, 等. 空间网络中基于身份的分布式密钥管理研究[J].电子与信息学报, 2010, 32(1): 183–188.DOI: 10.3724/SP.J.1146.2009.00461.

    LUO Changyuan, LI Wei, XING Hongzhi, et al.. Research on identity-based distributed key management in space network[J]. Journal of Electronics & Information Technology, 2010, 32(1): 183–188. doi: 10.3724/SP.J.1146.2009.00461.
    XIA Pengrui, WU Meng, WANG Kun, et al. Identity-based fully distributed certificate authority in an OLSR MANET[C]. International Conference on Wireless Communications, Networking and Mobile Computing. Dalian, China, 2008: 1–4.
    任艳丽, 蔡建兴, 黄春水, 等.基于身份加密中可验证的私钥生成外包算法[J].通信学报, 2015, 36(11): 61-66. DOI: 10.11959/j.issn.1000-436x.2015233.

    REN Yanli, CAI Jianxing, HUANG Chunshui, et al.. Verifiable outsourcing private key generation algorithm in an identity-based encryption scheme[J]. Journal of Communications, 2015, 36(11): 61–66. DOI: 10.11959/j.issn.1000-436x.2015233.
    李慧贤, 庞辽军, 王育民. 适合ad hoc网络无需安全信道的密钥管理方案[J].通信学报, 2010, 31(1): 112–117.

    LI Huixian, PANG Liaojun, and WANG Yumin. Key management scheme without secure channel for ad hoc networks[J]. Journal of Communications, 2010, 31(1): 112–117.
  • 加载中
图(3) / 表(1)
计量
  • 文章访问数:  1987
  • HTML全文浏览量:  546
  • PDF下载量:  52
  • 被引次数: 0
出版历程
  • 收稿日期:  2017-12-06
  • 修回日期:  2018-05-02
  • 网络出版日期:  2018-06-07
  • 刊出日期:  2018-08-01

目录

    /

    返回文章
    返回