期刊文献+

浅谈大规模移动自组的网络安全技术 被引量:1

The large-scale mobile ad-hoc network security technology
原文传递
导出
摘要 随着社会的不断进步,人们对移动通信的依赖性越来越明显,移动通信技术也正飞速发展着,在这个大环境下,移动自组网络技术开始步入人们的生活。这是一种直接的通信形式,依靠通信节点进行连接组织,不需要任何基础设施支持。移动自组网络技术能运用于诸多领域,如军事应用、医疗应用、紧急救灾、电子商务等。网络安全问题在计算机网络产生之初就一直存在,本文对移动自组网络安全技术的关键和大规模移动自组网络技术未来的发展趋势做了简要分析。 With the development of society, people depends on the mobile communication is more and more obvious, the mobile communication technology is developing rapidly, in this environment, the mobile ad-hoc network technology comes into the life of people. This is a direct communication form, rely on communication nodes connected organization, does not need any infrastructure support. The mobile ad hoc network technology can be used in many fields, such as military applications, medical applications, emergency relief, electronic commerce etc.. There has been the problem of network security in the beginning of computer network, the paper briefly analyzes the key of mobile ad hoc network security technology and the future development trend of large-scale mobile ad-hoc network security technology.
作者 顾晓宁
机构地区 集宁师范学院
出处 《佳木斯教育学院学报》 2013年第5期455-455,457,共2页 Journal of Jiamusi Education Institute
关键词 大规模 移动自组网络 安全技术 mass mobile ad-hoc network security technology
  • 相关文献

参考文献6

二级参考文献73

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2李芳.移动Ad hoc网络应用及安全问题分析[J].移动通信,2006,30(4):82-85. 被引量:5
  • 3胡华平,胡光明,董攀,陈新.大规模移动自组网络安全技术综述[J].计算机研究与发展,2007,44(4):545-552. 被引量:13
  • 4Zhu S,Setia S,Xu S H,et al.GKMPAN:An efficient group rekeying scheme for secure multicast in ad-hoc networks[J].Journal of Computer Security,2006,14(4):301-325.
  • 5Ateniese G,Steiner M,Tsudik G.Authenticated group key agreement and friends[C] //Proc of the 5th ACM Conf on Computer and Communications Security.New York:ACM,1998:17-26.
  • 6Basagni S,Herrin K,Bruschi D.Secure pebblenets[C] //Proc of the 2001 ACM Int Symp on Mobile Ad Hoc Networking and Computing.New York:ACM,2001:156-163.
  • 7Anton E R,Duart O C.Group key establishment in wireless ad hoc networks[C] //Proc of Worshop on Quality of Service and Mobility.New York:ACM,2002.
  • 8Steiner M,Tsudik G,Waidner M.CLIQUES:A new approach to group key agreement[C] //Proc of the 18th Int Conf on Distributed Computing Systems(ICDCS'98).Los Alamitos,CA:IEEE Computer Society,1998:380-387.
  • 9Becker K,Wille U.Communication complexity of group key distribution[C] //Proc of the 5th ACM Conf Computer and Communication Security.New York:ACM,1998.
  • 10Ingemarsson I,Tang D T,Wong C K.A conference key distribution system[J].IEEE Trans on Information Theory,1982,28(5):714-720.

共引文献185

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部