期刊文献+

基于身份的Ad Hoc网络密钥管理方案 被引量:6

ID-based Key Management Scheme for Ad Hoc Networks
在线阅读 下载PDF
导出
摘要 在分析现有的Ad Hoc网络分布式信任方案基础上,使用双线性对技术提出一个基于身份的Ad Hoc网络密钥管理方案。该方案结合基于身份的密码学算法与分布式秘密共享算法将系统主密钥分发给一组预选节点,由其合作实现私钥生成中心PKG功能。一次单播即可安全高效地实现节点私钥更新,基于双线性对性质,一次交互即可安全地建立节点间的会话密钥。分析结果表明该方案安全高效。 Following the analysis of existing distributed trust model to Ad Hoc networks, this paper presents an ID-based key management scheme using bilinear pairing. It employs the secret-sharing technique to distribute system key among a pre-selected set of nodes, called D-PKGs, which offers a collaborative private-key-generator service. The construction method not only ensures secure and efficient network-wide key update, but also establishes session key via only a single message using property of bilinear pairing. Analysis show the scheme is secure and effective.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第24期143-145,共3页 Computer Engineering
关键词 移动自组网 秘密共享 基于身份 双线性对 Ad Hoc networks secret sharing ID-based bilinear pairing
作者简介 吴平(1979-),男,硕士研究生,主研方向:移动自组网及网络性能.E-mail:wpieu@sina.com 王保云,硕士研究生. 徐开勇,研究员.
  • 相关文献

参考文献13

  • 1Zhou Lidong, Schneider F B, Van R R. COCA: A Secure Distributed On-line Certification Authority[J]. ACM Transactions on Computer Systems, 2002, 20(4): 329-368.
  • 2Shamir A. How to Share a Secret[J]. Communication of the ACM, 1979, 22(11): 612-613.
  • 3Luo Haiyun, Kong Jiejun, Zerfos P, et al. URSA: Ubiquitous and Robust Access Control for Mobile Ad-hoc Networks[J]. IEEE/ ACM Transactions Networking, 2004, 12(6): 1049-1063.
  • 4Douceur J R. The Sybil Attack[C]//Proc. of the 1st Int'l Workshop on Peer-to-Peer Systems. Gambridge, MA, USA: Springer-Verlag, 2002:251-260.
  • 5Jarecki S, Saxena N, Yi J H. An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol[C]//Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. [S. l.]: ACM Press, 2004.
  • 6Guttman E PKI: Its Not Dead, Just Resting[J]. IEEE Computer, 2002, 35(8): 41-49.
  • 7Shamir A. Identity Based Cryptosystems and Signature Schemes[C]//Proc. of CRYPTO'84. New York, USA: [s. n.], 1984: 47-53.
  • 8Zhang Yanchao, Liu Wei, Lou Wenjing, et al. AC-PKI: Anonymous and Certificate-less Public Key Infrastructure for Mobile Ad Hoc Networks[C]//Proc. of IEEE Int'l Conf. on Comm.. [S. l.]: IEEE Press, 2005: 3515-3519.
  • 9Zhang Yanchao, Liu Wei, Lou Wenjing, et al. MASK: Anonymous On-demand Routing in Mobile Ad Hoc Networks[J]. IEEE Trans. of Wireless Comm., 2006, 5(9): 2376-2385.
  • 10Hoeper K, Gong G. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-based Schemes with Key Revocation[D]. Vancouver, Canada: University of Waterloo, 2006.

同被引文献38

  • 1周晶,蒋泽军,徐邦海.Ad Hoc网络安全[J].微计算机应用,2005,26(1):11-13. 被引量:7
  • 2李光松,韩文报.分簇Ad Hoc网络的密钥管理[J].计算机科学,2006,33(2):79-82. 被引量:6
  • 3杨德明,慕德俊,许钟.Ad hoc空间网络密钥管理与认证方案[J].通信学报,2006,27(8):104-107. 被引量:17
  • 4叶永飞,余梅生.基于簇结构的Ad Hoc网络安全密钥管理方案[J].计算机应用,2007,27(3):611-613. 被引量:1
  • 5Shamir A. Identity-based Cryptosystems and Signature Schemes [C]//Proc. of CRYPTO' 84. New York, USA: [s. n]. 1984: 47- 53.
  • 6Boneh D, Franklin M. Dentity-based encryption from the Weil pairing [C] // Advances in Cryptology CRYPTO 2001. Berlin: Springer-Verlag, 2001 : 213-229.
  • 7Zhou L, Hass Z J. Securing Ad-hoc networks[J]. IEEE Networks, 1999,13 (6): 24-30.
  • 8Zhou Lidong, Hass Z J. Securing Ad Hoc Networks[J]. IEEE Net- works, 1999, 13(6): 24-30.
  • 9ZHOU L, HAAS Z J. Securing Ad hoc Networks[J]. IEEE Networks, 1999, 13(6): 24-30.
  • 10LUO H, ZERFOS P, KONG J, et al. Self-securing Ad Hoc Wireless Networks[C]. In: 7th 1EEE Symp on Computers and Communications, 2002. 567-574.

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部