期刊文献+

车载自组网的可信认证与信任评估框架 被引量:9

Novel trusted authentication and evaluation framework in VANET
在线阅读 下载PDF
导出
摘要 车载自组网(VANET,vehicular ad hoc networks)具有无中心、移动性和多跳传输等特点,使得传统的密钥管理方式不再适用。可信计算技术的快速发展和成功应用为解决VANET的有效认证和信任评估问题提供了一条潜在途径。针对具有自组织特性的VANET网络,基于可信计算技术提出了一种新的认证和信任评估框架,引入了可信属性和可信等级的概念,给出了密钥管理结构和移动节点认证过程,着重指出了该框架潜在的实际应用。另外,阐述了在该框架下的信任评估方法。 Vehicular ad hoc networks(VANET) have many new characteristics unlike tranditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements.The fast development and successful application of trusted computing technology provide a potential solution to achieve effective authentica-tion and trust evaluation.According to the VANET with self-organization, a new authentication and trust evaluation framework was proposed based on trusted computing technology, the concepts of'trusted attribute'and'trusted grade'were introduced, and the key management architecture as well as authentication process of mobile node were explained in detail.Moreover, the potential real application of the presented framework was discussed, and the trust evaluation method and its argumentation in the presented framework were given.
出处 《通信学报》 EI CSCD 北大核心 2009年第S1期107-113,共7页 Journal on Communications
基金 国际科技合作与交流专项(2008DFA12140) 国家教育部博士点基金资助项目(20060183043) 国家科技支撑计划(2008BAH22B02) 吉林大学研究生"985工程"创新计划项目(20080235)~~
关键词 车载自组网 可信计算 认证 信任评估 密钥管理 vehicular ad hoc networks trusted computing authentication trust evaluation key management
  • 相关文献

参考文献16

  • 1王健,刘衍珩,焦玉.VANETs信任传播建模[J].北京邮电大学学报,2009,32(B04):62-65. 被引量:6
  • 2王健,刘衍珩,张瀛戈,梅芳.一种新的可信修复网络模型及其实现[J].解放军理工大学学报(自然科学版),2008,9(5):470-474. 被引量:1
  • 3SIEWIOREK Daniel P.,杨孝宗,CHILLAREGE Ram,KALBARCZYK Zbigniew T..可信计算的产业趋势和研究(英文)[J].计算机学报,2007,30(10):1645-1661. 被引量:9
  • 4LABERTEAUX K P,HAAS J J,HU Y-C.Security certificate revoca-tion list distribution for VANET. Proceedings of VANET . 2008
  • 5IVAN DAMG-RD,MACIEJ KOPROWSKI.Practical threshold RSA signatures without a trusted dealer. Proceedings of the International Conference on the Theory and Application of Cryptographic Tech-niques:Advances in Cryptology . 2001
  • 6XU G,IFTODE L.Locality driven key management architecture for mobile AD-Hoc networks. Proceedings of IEEE International Con-ference on Mobile Ad-hoc and Sensor Systems . 2004
  • 7YI S,KRAVETS R.Moca:Mobile certificate authority for wireless ad hoc networks. Proceedings of the10th IEEE International Conference on Network Protocols . 2002
  • 8AURA T,,M-KI S.Towards a survivable security architecture for ad-hoc networks. Proceedings of9th International Workshop on Security Protocols . 2001
  • 9WANG J,LIU Y H,ZHANG J,et al.Research on hiberarchy trusted network based on the grade division. Proceedings of the ISKE . 2008
  • 10DONG P,ZHU P D.A new key management scheme for large-scale MANET. Proceedings of International Conference on Computa-tional Intelligence and Security . 2006

二级参考文献78

  • 1武延军,梁洪亮,赵琛.一个支持可信主体特权最小化的多级安全模型[J].软件学报,2007,18(3):730-738. 被引量:14
  • 2SESHADRI A, LUK M, PERRIG A, et al. Externally verifiable code execution [J]. Commununications of the ACM, 2006, 49(9): 45-49.
  • 3LUO An-an, LIN Chuang, CHEN Zhen, et al. TNC- compatible NAC System implemented on Network Processor [C]. Washington: The 32nd IEEE Conference on Local Computer Networks, 2007.
  • 4VASILIADIS D C, RIZOS G E, STERIOU E,et al. A trusted network model using the lightweight directory access protocol [C]. Wisconsin: The 7th Conference on WSEAS International Conference on Applied Informatics and Communications, 2007.
  • 5SCHELLEKENS D, WYSEUR B, PRENEEL B. Remote attestation on legacy operating systems with trusted platform modules [J]. Electronic Notes in Theoretical Computer Science, 2008, 197(1): 59-72.
  • 6HASSAN J, SIRISENA H, B LANDFELDT. Trustbased fast authentication for multiowner wireless networks [J].IEEE Transactions on Mobile Computing, 2008, 7(2):247-261.
  • 7Raya M, Papadimitratos P, Hubaux J P. Securing vehicular communications [J]. IEEE Wireless Communications Magazine, 2006, 13(5): 8-15.
  • 8Philipp W, Jochen B, Albert H, et al. Trust issues for vehieular ad hoc networks [C]// VTC 2008- Spring. Piseataway: IEEE Press, 2008:2800-2804.
  • 9Yan Gongjun, Olariu S, Weigle M C. Providing VANET security through active position detection [J]. Computer Communications, 2008, 31 (12): 2883- 2897.
  • 10Zouridaki C, Mark B L, Hejmo M, et al. A quantitative trust establishment framework for reliable data packet delivery in MANETs[C]// ACM Workshop on Security of Ad hoc and Sensor Networks. New York: ACM Press, 2005: 1-10.

共引文献13

同被引文献65

  • 1俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:24
  • 2SHIH KP, CHEN HC, TSAIJK, et al. PALM: a partition avoidance lazy movement protocol for mobile sensor networks [ C ]. Wireless Communications and Networking Conference, 2007: 2486-2491.
  • 3CHANDM P, SONI K. Performance comparison of AODV and DSR on-demand routing protocols for mobile Ad-Hoc networks [J]. International Journal of Comput- er Applications, 2012, 49(18) : 1-5.
  • 4YANG Q, LIM A, AGRAWAL P. Connectivity aware routing in vehicular networks [ C ]. Wireless Communi- cations and Networking Conference, 2008: 2218-2223.
  • 5TARASOV M,SEITZ J, ARTEMENKO O. A network par- titioning recovery process in mobile ad-hoc networks[ C ]. IEEE 7th International Conference on Wireless and Mo- bile Computing, Networking and Communications, 2011 : 32-36.
  • 6LIN L, XIAO X Q, XU M, et al. PCR: a position-and- connectivity-based routing protocol for VANETs [ J ]. IEEE computer society, 2010, 119(10) : 469-473.
  • 7LEE K C, LEE U, GERAL M. Geo-opportunistic rou- ting for vehicular networks [ J ]. IEEE Communications Magazine, 2010, 48(5) : 164-171.
  • 8MANVI S S, KAKKASAGERI M S, MAHAPURUSH C V. Performance analysis of AODV, DSR, and swarm intelligence routing protocols in vehicular ad hoc net- work environment[ C ]. International Conference on Fu- ture Computer and Communication, 2009 : 21-25.
  • 9林磊.车载网络路由协议设计与优化[D].长沙:国防科学技术大学,2010.
  • 10KARP B, KUNG H T, GPSR: greedy perimeter state- less routing for wireless networks [ C ]. Proceedings of the 6th annual international conference on Mobile com- puting and networking, 2000 : 243-254.

引证文献9

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部