高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于分簇的Ad hoc网络分布式认证方案

周南润 万辉

周南润, 万辉. 基于分簇的Ad hoc网络分布式认证方案[J]. 电子与信息学报, 2009, 31(9): 2247-2251. doi: 10.3724/SP.J.1146.2008.01273
引用本文: 周南润, 万辉. 基于分簇的Ad hoc网络分布式认证方案[J]. 电子与信息学报, 2009, 31(9): 2247-2251. doi: 10.3724/SP.J.1146.2008.01273
Zhou Nan-run, Wan Hui. Distributed Authentication Scheme for Cluster-Based Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2247-2251. doi: 10.3724/SP.J.1146.2008.01273
Citation: Zhou Nan-run, Wan Hui. Distributed Authentication Scheme for Cluster-Based Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2247-2251. doi: 10.3724/SP.J.1146.2008.01273

基于分簇的Ad hoc网络分布式认证方案

doi: 10.3724/SP.J.1146.2008.01273
基金项目: 

国家自然科学基金(10647133),江西省自然科学基金(2007GQS1906),江西省教育厅科技项目(赣教技字[2007]22),江西省教育科学十一五规划项目重点课题(07ZD017)和南昌大学引进人才科研启动费资助课题

Distributed Authentication Scheme for Cluster-Based Ad hoc Networks

  • 摘要: 认证是保证Ad hoc网络通信安全的重要技术。该文针对分布式认证方案分别运用在平面Ad hoc网络和分簇结构中的优缺点进行了比较研究,提出了一种区域认证方案,该方案采用分簇结构,将Ad hoc网络分割为相互独立的认证区域,既减少了网络开销,又增强了认证服务效率,且安全性和可扩展性较好,适用于大规模Ad hoc网络。
  • Ramanathan R and Redi J. A brief overview of mobile Adhoc networks: challenges and directions [J]. IEEECommunications Magazine, 2002, 40(5): 20-22.[2]Zhou Li-dong and Haas Z J. Securing Ad hoc networks [J].IEEE Networks Special Issue on Network Security, 1999, 13(6): 24-30.[3]Kong J J, Zerfos P, and Luo H Y, et al.. Providing robust andubiquitous security support for mobile Ad hoc networks [C].IEEE 9th International Conference on Network Protocols,Riverside, California, USA, 2001: 251-260.[4]Herzberg A, Jakobsson M, and Jarecki S, et al.. Proactivepublic-key and signature schemes [C]. Proc of the 4th AnnualConference on Computer Communications Security, Zurich,Switzerland, 1997: 100-110.[5]葛蒙, 赵曦滨, 林国恩. 适用于移动自组织网的鲁棒性密钥管理[J]. 清华大学学报(自然科学版), 2008, 48(7): 1194-1197.Ge Meng, Zhao Xi-bin, and Lam Kwok-yan. Robust keymanagement for mobile Ad hoc networks [J]. Journal ofTsinghua University (Science and Technology), 2008, 48(7):1194-1197.[6]王化群, 张力军, 赵君喜. Ad hoc网络中基于环Zn上椭圆曲线和RSA的密钥管理[J]. 通信学报, 2006, 27(3): 1-6.Wang Hua-qun, Zhang Li-jun, and Zhao Jun-xi. Keymanagement based on elliptic curves over the ring Zn andRSA in Ad hoc networks [J]. Journal on Communications,2006, 27(3): 1-6.[7]熊焰, 苗付友, 张伟超, 等. 移动自组网中基于多跳步加密签名函数签名的分布式认证[J]. 电子学报, 2003, 31(2): 161-165.Xiong Yan, Miao Fu-you, Zhang Wei-chao, et al.. Securedistributed authentication based on multi-hop signing withencrypted signature functions in mobile Ad hoc networks [J].Acta Electronica Sinica, 2003, 31(2): 161-165.[8]Pietro R D, Mancini L V, and Zanin G. Efficient andadaptive threshold signatures for Ad hoc networks [J].Electronic Notes in Theoretical Computer Science.2007,171(1):93-105[9]安辉耀, 卢锡城, 彭伟. 移动自组网中一种基于簇的多路径路由算法[J]. 软件学报, 2007, 18(4): 987-995.An Hui-yao, Lu Xi-cheng, and Peng Wei. A cluster-basedmultipath routing algorithm in mobile Ad hoc networks [J].Journal of Software, 2007, 18(4): 987-995.[10]Gerla M and Tsai J T C. Multicluster, mobile, multimediaradio network [J]. ACM/Baltzer Journal of WirelessNetworks, 1995, 1(3): 225-265.[11]Dong Y, and Sui Ai-fen, et al.. Providing distributedcertificate authority service in cluster-based mobile Ad hocnetworks [J].Computer Communications.2007, 30(11/12):2442-2452[12]Bechler M, Hof H J, and Kraft D, et al.. A cluster-basedsecurity architecture for Ad hoc networks [C]. Proc of the23rd IEEE INFOCOM'04, Hong Kong, China, 2004, 4:2393-2403.[13]Pedersen T. A threshold cryptosystem without a trustedparty[C]. Proceeding of Crypto 91, Brighton, UK, 1991:522-526.[14]Spiewak D and Fusenig V, et al.. The importance of locationon trust in mobile networks [J]. WSEAS Transactions onCommunications, 2008, 7(5): 349-360.
  • 加载中
计量
  • 文章访问数:  3202
  • HTML全文浏览量:  86
  • PDF下载量:  870
  • 被引次数: 0
出版历程
  • 收稿日期:  2008-10-06
  • 修回日期:  2009-04-09
  • 刊出日期:  2009-09-19

目录

    /

    返回文章
    返回