高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于HuffMHT的自组织网络实体认证协议

周贤伟 郭继文

周贤伟, 郭继文. 基于HuffMHT的自组织网络实体认证协议[J]. 电子与信息学报, 2010, 32(4): 852-856. doi: 10.3724/SP.J.1146.2009.00169
引用本文: 周贤伟, 郭继文. 基于HuffMHT的自组织网络实体认证协议[J]. 电子与信息学报, 2010, 32(4): 852-856. doi: 10.3724/SP.J.1146.2009.00169
Zhou Xian-wei, Guo Ji-wen. HuffMHT-Based Entity Authentication Scheme for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2010, 32(4): 852-856. doi: 10.3724/SP.J.1146.2009.00169
Citation: Zhou Xian-wei, Guo Ji-wen. HuffMHT-Based Entity Authentication Scheme for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2010, 32(4): 852-856. doi: 10.3724/SP.J.1146.2009.00169

基于HuffMHT的自组织网络实体认证协议

doi: 10.3724/SP.J.1146.2009.00169

HuffMHT-Based Entity Authentication Scheme for Ad hoc Networks

  • 摘要: 针对自组织网络节点能量消耗和存储有限的特点,该文提出一种适合于自组织网络的基于HuffMHT的实体认证方案。该方案利用HuffMHT的思想可获得有效的安全策略;并使用对称密钥算法和公钥加密算法相结合,有效地降低了认证时延,提高了网络生命期和安全性。此外,在自组织网络设定簇头和建立HuffMHT时,该文给出了功耗最小算法和引入Christofides算法,缩短节点之间发射信号的距离,有效地降低节点能耗,提高了网络生命期。
  • Karlof C and Wagner D. Secure routing in wireless sensornetworks: attacks and countermeasures [C]. IEEEInternational Workshop on sensor Network Protocols andApplications, California Univ., Berkeley, CA, USA, 2003:113-127.[2]Rebahi Y, Mujica-V V E, and Sisalem D. A reputation-basedtrust mechanism for ad hoc networks [C]. Proc. 10th IEEESymposium on Computers and Communications, FraunhoferFokus, Germany, 2005: 37-42.[3]Sun Y L, Han Z, and Yu W, et al.. Attacks on trustevaluation in distributed networks [C]. IEEE Conference onInformation Sciences and Systems, CLSS 2006-Proceedings,Rhode Island Univ., Kingston, RI, 2007: 1461-1466.[4]Tuptuk N and Lupu E. Risk based authorisation for mobilead hoc networks [J]. Lecture Notes in Computer Science,Springer-verlag, 2007, 4543: 188-191.[5]Rabadi N M and Mahmud S M. Privacy protection amongdrivers in vehicle-to-vehicle communication networks [C]. 4thAnnual IEEE Consumer Communications and NetworkingConference, CCNC2007, Las Vegas, NV, USA, 2007:281-286.[6]Papapanaqiotou K, Marias G F, and Georqiadis P et al..Performance evaluation of a distributed OCSP protocol overMANETs [C]. 3rd IEEE Consumer Communications andNetworking Conference, Piscataway, NJ, USA, 2006, 1: 1-5.[7]Wang L N, Shi D J, and Qin B P, et al.. Clustering-basedmerkel hash tree entity authentication scheme [J]. ChineseJournal of Sensors and Actuators, 2007, 20(6): 1338-1343.[8]Munoz J L, Forne J, and Esparza O, et al.. Efficientcertificate revocation system implementation: huffmanmerkle hash tree (HuffMHT) [J]. Springer-Verlag BerlinHeidelberg, LNCS, 2005, 3592: 119-127.[9]Aboudagga N, Refaei M T, and Eltoweissy M.Authentication protocols for ad hoc networks: taxonomy andresearch issues [C]. International Workshop on ModelingAnalysis and Simulation of Wireless and Mobile Systems,Montreal, Quebec, Canada, 2005: 96-104.[10]Hu W, Chou C T, and Jha S, et al.. Deploying long-lived andcost-effective hybrid sensor networks [J].Ad hoc Networks.2006, 4(6):749-767[11]Korte B and Vygen J. Combinatorial Optimization Theoryand Algorithms (Fourth Edition) [M]. Springer-Verlag BerlinHeidelberg, 2008: 527-529.[12]Skold M, Yeongyoon C, and Nilsson J. An analysis of mobileradio Ad hoc networks using cluster architectures [C]. 57thIEEE Vehicular Technology Conference, Swedish DefenceRes. Agency, Linkoping, Sweden, 2003, 1: 181-185.[13]Chiasserini C F, Chlamtac I, and Monti P, et al.. Anenergy-efficient method for nodes assignment in cluster-basedad hoc networks [J].Wireless Networks.2004, 10(3):223-231[14]Heinzelman W B, Chandrakasan A P, and Balakrishnan H.An application-specific protocol architecture for wirelessmicrosensor networks [J]. IEEE Transactions on WirelessCommunications, 2002, 1(4): 660-670.[15]叶银法, 陆健贤, 罗丽等. WCDMA 系统工程手册[M]. 机械工业出版社, 2006: 470-471.Ye Y F, Lu J X, and Luo L, et al.. Handbook of WCMASystem Engineering [M]. China Machine Press, 2006:470-471.
  • 加载中
计量
  • 文章访问数:  3663
  • HTML全文浏览量:  84
  • PDF下载量:  779
  • 被引次数: 0
出版历程
  • 收稿日期:  2009-02-13
  • 修回日期:  2009-11-22
  • 刊出日期:  2010-04-19

目录

    /

    返回文章
    返回