Advanced Search
Volume 32 Issue 1
Aug.  2010
Turn off MathJax
Article Contents
Luo Chang-yuan, L i Wei, Xing Hong-zhi, Chu Xiao. Research on Identity-based Distributed Key Management in Space Network[J]. Journal of Electronics & Information Technology, 2010, 32(1): 183-188. doi: 10.3724/SP.J.1146.2009.00461
Citation: Luo Chang-yuan, L i Wei, Xing Hong-zhi, Chu Xiao. Research on Identity-based Distributed Key Management in Space Network[J]. Journal of Electronics & Information Technology, 2010, 32(1): 183-188. doi: 10.3724/SP.J.1146.2009.00461

Research on Identity-based Distributed Key Management in Space Network

doi: 10.3724/SP.J.1146.2009.00461
  • Received Date: 2009-04-02
  • Rev Recd Date: 2009-10-09
  • Publish Date: 2010-01-19
  • In order to resolve the problems of concentrating key management and over-consumption on certificate maintenance in space network, an identity-based distributed key management scheme is proposed. On the basis of the properties of space network, the method for constructing distributed private key generators is put forward. According to identity-based cryptography proposed by Boneh and Franklin, the scheme designs the methods of updating private key, updating host-key shares and negotiating session key. Analysis and simulation show that the scheme can meet the safety requirements and has good scalability.
  • loading
  • Bhasin K and Hayden J L. Space internet architectures andtechnologies for NASA Enterprises [J].International Journalof Satellite Communications.2002, 20(5):311-332[2]杨德明, 慕德俊, 许钟. Ad hoc空间网络密钥管理与认证方案[J]. 通信学报, 2006, 27(8): 104-107, 112.Yang De-ming, Mu De-jun, and Xu Zhong. Novel keymanagement and authentication scheme for ad hoc spacenetworks [J]. Journal on Communications, 2006, 27(8):104-107, 112.[3]彭长艳, 沈亚敏, 王剑等. 基于身份的空间网络安全研究[J].飞行器测控学报, 2008, 27(3): 56-62.Peng Chang-yan, Shen Ya-min, and Wang Jian, et a1..Research on identity-based space network security [J].Journal of Spacecraft TTC Technology, 2008, 27(3): 56-62.[4]吴平. 基于身份的Ad hoc网络密钥管理研究与仿真[D]. [硕士论文], 郑州: 信息工程大学, 2008.Wu Ping. Research and simulation of ad hoc network keymanagement based on identity [D]. Zhengzhou: InformationEngineering University, 2008.[5]Deng H.[J].Mukherjee A, and Agrawal P. Threshold andidentity-based key management and authentication forwireless ad hoc networks [C]. Proc of IEEE InternationalConferences on Information Technology (ITCC04).2004,:-[6]杜春来, 胡铭曾, 张宏莉. 在椭圆曲线域中基于身份认证的移动Ad hoc密钥管理框架[J]. 通信学报, 2007, 28(12): 53-59.Du Chun-lai, Hu Ming-zeng, and Zhang Hong-li. New groupkey management framework for mobile Ad hoc network basedon identity authentication in elliptic curve field[J]. Journal onCommunications, 2007, 28(12): 53-59.[7]Shamir A. Identity Based crypto systems and signatureschemes[C]. Proc. CRYPTO84, 1984: 47-53.[8]Boneh D and Franklin M. Dentity-based encryption forms theWeil pairing[C]. In: Kilian J. ed. Advances in CryptologyCRYPTO 2001, Lecture Notes in Computer Science 2139.Berlin: Springer-Verlag, 2001: 213-229.[9]Shamir A. How to share a secret [J]. Communications of theACM, 1979, 22(11): 6l2-6l3.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3883) PDF downloads(970) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return