期刊文献+

一种新的移动Ad hoc网络的安全路由策略 被引量:4

A New Strategy of Security Routing in Mobile Ad hoc Networks
下载PDF
导出
摘要 本文从各网络节点易受攻击、俘获,各网络节点之间不可信赖的角度出发,引入了可信任第三方的信任分散策略并结合Diffie-Hellman密钥交换算法,提出了一种新的移动Adhoc网络的安全路由策略。 From the perspective of fragility of security brought by the network nodes easy to be attacked , communication easy to be captured and nonconfidence between nodes , this paper presents a new strategy of security routing in mobile Ad hoc networks. The strategy is based on the technique of confidence distribution with third party combining with Diffie-Hellman key exchange algorithm.
作者 蒋毅 史浩山
出处 《微电子学与计算机》 CSCD 北大核心 2005年第4期30-32,37,共4页 Microelectronics & Computer
关键词 移动AD-HOC网络 CA Diffie-Hellman密钥交换算法 安全路由 Nobile ad hoc networks, CA, Diffie-Hellman key exchange algorithm, Security routing
  • 相关文献

参考文献6

  • 1Keng Seng Ng, Seah, W K G. Routing Security and Data Confidentiality for Mobile Ad hoc Networks. Vehicular Technology Conference, 2003. VTC 2003-Spring. The 57th IEEE Semiannual, 2003, 3(3):1821~1825. 被引量:1
  • 2Wenjing Lou, Yuguang Fang. A Multipath Routing Approach for Secure Data Delivery, Military Communications Conference, 2001.MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force.IEEE, 2001, 2(2): 1467~1473. 被引量:1
  • 3Lidong Zhou, Haas Z J. Securing Ad hoc Networks. IEEE Network, 1999, 13(6): 24~30. 被引量:1
  • 4汤惟..密码学与网络安全技术基础[M],2004.
  • 5周海刚,肖军模.Ad hoc网络安全模型的研究[J].解放军理工大学学报(自然科学版),2002,3(3):5-8. 被引量:10
  • 6杜欣军,葛建华,王莹.一种增强AODV路由协议安全性的方案[J].西安电子科技大学学报,2002,29(6):819-821. 被引量:9

二级参考文献5

  • 1SCHNEIER B. Applied cryptography[M].北京:机械工业出版社.2000. 被引量:1
  • 2ZHOU L,HAAS Z J. Securing ad hoc networks[J].IEEE Network, 1999,13(6) : 24-30. 被引量:1
  • 3SHAMIR A. How to share a secret[J]. Communications of the ACM,1979,22(11):612-613. 被引量:1
  • 4Zhou Lidong,Hass Z J.Securing Ad Hoc Netowrks[].IEEE Network.1999 被引量:1
  • 5Royer E M.A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks[].IEEE Personal Communications.1999 被引量:1

共引文献16

同被引文献28

  • 1杨宗凯,赵大胜,王玉明,程文青,何建华.传感器网络虚拟骨干构造算法及时钟同步应用[J].微电子学与计算机,2005,22(8):10-13. 被引量:8
  • 2苗建松,丁炜.移动自组网椭圆曲线门限签名加密算法安全性分析[J].微电子学与计算机,2006,23(11):96-98. 被引量:2
  • 3[1]PERRING A, SZEWCZYK R, WEN V, et al. SPINS: Security protocols for sensor networks[J]. Wireless Networks, 2002, 8:521-534. 被引量:1
  • 4[2]JAMSHAID K, SCHWIEDERT L. SEKEN (Secure and efficient key exchange for sensor networks)[J]. 23rd IEEE International Performance, Computing, and Communications Conference (IPCCC), 2004, 4:415-422. 被引量:1
  • 5[4]DU W, DENG J, HAN Y S, et al. A pairwise key predistribution scheme for wireless sensor networks[J]. Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), 2003, 10:42-51. 被引量:1
  • 6[5]GUNTHER C G. An identity-based key-exchange protocol[J]. Advances in Cryptology, EUROCRYPT, 1989 LNCS, 434:29-37. 被引量:1
  • 7[6]KHALILI A, KATZ J, ARBAUTH W A. Toward secure key distribution in truly ad-hoc networks[A]. SAINT 03 Works', 2003 Symposium on applications and the Internet Workshops[C]. [S.l.]: IEEE C S Press, 2003,3:342-346. 被引量:1
  • 8[7]CHAN H, PERRING A, SONG D. Random key predistribution schemes for sensor networks[J]. IEEE Symposium on Security and Privacy. Berkeley, 2003, 5:197-213. 被引量:1
  • 9RFC 3561.Ad hoc on demand distance vector (AODV)routing.July 2003 被引量:1
  • 10Rapport T.Wireless communication:principles and practice[M].New Jersey,1996 被引量:1

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部