期刊文献+

一种车载mesh网络漫游匿名接入认证协议 被引量:3

Efficient Roaming Authentication with Anonymity Protocol for Wireless Vehicle Mesh Networks
在线阅读 下载PDF
导出
摘要 无线mesh网络的特性使它面临着比传统无线网络更大的安全挑战。其安全解决方案必须兼顾安全性和应用环境等因素。用户节点的接入认证与密钥协商是节点漫游时最基本的安全协议,是安全路由等协议的实现基础。在多跳车载mesh网络用户节点接入认证中,用户身份信息的保护非常重要,然而有关车载mesh网络用户节点漫游时的匿名认证的研究较少,为此,在充分考虑无线mesh网络自身特点的基础上,结合基于Hash和Diffie-Hellman算法,提出一种高效的用户节点匿名接入认证与密钥协商协议。分析发现,该协议不仅可以满足安全性需求,在现实应用中也是可行的。 Due to their own characteristics, wireless mesh networks are facing more security challenges than traditional networks. Their security mechanism should take into account both the security and the application environment. Anony- mous authentication and key negotiation, when users roam, are an elementary protocol in constructing a secure network system,and are the implementation foundation of the secure routing protocol. The user's certificated in wireless mesh networks, protection of identity information is very important, but the study of anonymous authentication and key nego- tiation when users roam in wireless mesh networks was too little. Motivated by these concerns,on the enough considera- tion on the attack methods for wireless networks and the characteristics of wireless mesh networks, an efficient roaming authentication with anonymity protocol for wireless vehicle mesh networks was proposed,in which the ID based public key cryptography and Diffie-Hellman algorithm were adopted. Analysis shows that this protocol can be used to guarantee the security of wireless mesh networks, and at the same time, it can meet the special application environment of wireless vehicle mesh networks.
出处 《计算机科学》 CSCD 北大核心 2010年第2期53-55,81,共4页 Computer Science
基金 国家自然科学基金(60803151)资助
关键词 MESH 漫游 匿名认证 协议 隐私保护 Mesh, Roaming, Anonymous authentication, Protocols, Privacy protection
作者简介 吴修强硕士生,主要研究方向为网络与信息安全,E—mail:xiuqiangwu@163.com 马华教授,主要研究方向为网络与信息安全、密码学; 张卫东高级工程师,主要研究方向为网络与信息安全; 裴庆棋博士,副教授,主要研究方向为计算机安全、无线传感器网络安全。
  • 相关文献

参考文献7

  • 1Salem B, Phubaux J. Securing Wireless Mesh Networks [J]. IEEE Wireless Communication, 2006,13 (2) : 50-55.
  • 2Islam S, Hamid A, et al. Preserving Identity Privacy in Wireless Mesh Networks[C] // Proceedings of International Conference on Information Networking. 2008.
  • 3阮星华,徐敬东,于博洋.VANET中位置路由协议的安全和隐私保护[J].计算机工程,2008,34(14):166-167. 被引量:5
  • 4Zhang Y, Liu W, Luo W. Anonymous Communication in Mobile Ad Hoe Networks[C]//Proceedings of INFOCOM. 2005.
  • 5Sun J, Zhang C, Fang Y. A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks[C]//Proceedings of IEEE INFOCOM. 2008:1687-1695.
  • 6方旭明,马忠建.无线Mesh网络的跨层设计理论与关键技术[J].西南交通大学学报,2005,40(6):711-719. 被引量:22
  • 7Raya M, Hubaux J P. The Security of Vehicular Ad Hoc Networks[C]//Proceedings of SASN. 2005.

二级参考文献57

  • 1傲丹,方旭明,马忠建.无线网格网关键技术及其应用[J].电讯技术,2005,45(2):16-22. 被引量:35
  • 2Fowler T.Mesh networks for broadband access[J].IEE Review,2001,47(1):17-22.
  • 3Whitehead P.Mesh networks:a new architecture for broadband wireless access systems[A].In:IEEE RAWCON 2000[C].Denver:IEEE Press,2000.43-46.
  • 4Rayner K.Mesh wireless networking[J].IEEE Communications Engineer,2003,1(5):44-47.
  • 5Tabata K,Kishi Y,Konishi S,et al.A study on the autonomous network synchronization scheme for mesh wireless network[A].In:IEEE PIMRC 2003[C].Beijing:IEEE Press,2003.829-833.
  • 6Kishi Y,Konishi S,Nanba S,et al.A proposal of millimeter-wave multi-hop mesh wireless network architecture with adaptive network control features for broadband fixed wireless access[A].IEEE RAWCON 2001[C].Waltham:IEEE Press,2001.17-20.
  • 7IEEE Standards "Get IEEE 802" (TM).Broadband IEEE 802.16(R)[DB/OL].http://standards.ieee.org/getieee802/802.16.html,2004-11-10.
  • 8Akyildiz I F,Wang X D,Wang W L.Wireless mesh networks:a survey[J].Computer Networks,2005,47(4):445-487.
  • 9Bennington R W,deClaris N.Multiprocessor implementations of neural networks[A].Systems,Man and Cybernetics,IEEE ICCP1990[C].Piscataway:IEEE Press,1990.323-325.
  • 10Leue S,Oechslin P.Formalizations and algorithms for optimized parallel protocol implementation[A].1994 International Conference on Network Protocols[C].Piscataway:IEEE Press,1994.178-185.

共引文献25

同被引文献14

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部