期刊文献+

无线Ad-Hoc网络密钥分发和认证机制研究 被引量:3

Study of Key Distribution and Management for Wireless Ad-Hoc
下载PDF
导出
摘要 针对Ad Hoc网络没有管理中心,资源受限等特点,解决了Ad-Hoc网络面临的新的安全问题,使Ad-Hoc网络得到更广泛的应用.结合基于身份加密和门限秘密共享两个基本理论,提出了一个适用于Ad-Hoc网络、没有管理中心的分布式密钥分发和认证方案.其优点是:减少了运算量,节省了存储空间和带宽,并无需在网络形成之前假设密钥已经分发完毕,从而有效解决了Ad-Hoc网络安全中密钥管理的问题. According to infrastructure-less and Low resource availability property of Ad-Hoc network,the solution of new security problems which Ad-Hoc faces is proposed and its practical applications is improved. Using recently developed concepts of identity-based cryptography and threshold cryptography, a distributed key distribution and authentication approach in Ad-Hoc networks is constructed for Ad-Hoc and no infrastructure. The most significant advantage of the scheme lies in the enhancement of security while reducing the communication overhead and resource consumption and saving network bandwidth. The security of the key management in Ad- Hoc network is efficiently resolved.
出处 《大连交通大学学报》 CAS 2007年第1期50-53,共4页 Journal of Dalian Jiaotong University
基金 辽宁省教育厅科学研究计划资助项目(2004D118)
关键词 AD-HOC网络 基于身份的加密算法 门限加密算法 Ad-Hoc密钥分发 Ad-Hoc认证 Ad-Hoc networks ID-based cryptography threshold cryptography key distribution in Ad-Hoc authentication in Ad-Hoc
  • 相关文献

参考文献6

  • 1ZHOU L, HAAS Z. Securing Ad Hoc Networks [ J ]. IEEE Network Magazine, 1999,13 (6) : 38-41. 被引量:1
  • 2BONEH D, FRANKLIN M. Identity-Based Encryption from the Weil Pairing [ C ]. Advances in Cryptology, CRYPTO 2001, 2001,2139:213-229. 被引量:1
  • 3HONGMEI DENG, ANINDO MUKHERJEE, DHARMA P AGRAWAL. Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks [ C ]. Proceedings of the International Conference on Information Technology : Coding and Computing (ITCC' 04) ,2004. 被引量:1
  • 4ARAM KHALILI,JONATHAN KATZ, WILLIAM A ARBAUGH. Toward Secure Key Distribution in Truly Ad-Hoc Networks [ C ]. Proceedings of the 2003 Symposium on Applications and the Intemet Workshops ( SAINT- w' 03) ,2003. 被引量:1
  • 5GEMMELL P. An introduction to threshold cryptography [ J ]. A technical newsletter of RSA Laboratories, 1997,2 (7) :31-34. 被引量:1
  • 6HONGMEI DENG, ANINDO MUKHERJEE, DHARMA P AGRAWAL. Threshold and Identity-based Key Management and Authentication for Wireless Ad- Hoc Networks [ C ]. Proceedings of the International Conference on Information Technology Coding and Computing ( ITCC '04) ,2004. 被引量:1

同被引文献52

  • 1陈炜,龙翔,高小鹏.一种基于身份的移动自组网认证机制[J].北京航空航天大学学报,2006,32(7):869-872. 被引量:4
  • 2杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 3SHAMIR A. Identity-based cryptosystems and signature schemes [ C ]//Proc of CRYPTO on Advances in Cryptology. Berlin: Springer-Verlag, 1984:47-53. 被引量:1
  • 4BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[ C ]//Proc of the 21st Annual International Cryptology Conference on Advances in Cryptology. Berlin:Springer-Verlag,2001:213-229. 被引量:1
  • 5COCKS C. An identity-based encryption scheme based on quadratic residues[ C]//Proc of the 8th IMA International Conference on Cryptography and Coding. Berlin : Springer-Verlag, 2001 : 360- 363. 被引量:1
  • 6HORWITZ J, LYNN B. Towards hierarchical identity-based encryption [ C ]//Proc of International Conference on Theory and Applications of Cryptographic Techniques. Berlin : Springer-Verlag, 2002 : 466-481. 被引量:1
  • 7GENTRY C, SILVERBERG A. Hierarchical ID-based cryptography [ C]//Proc of the 8th International Conference on Theory and Application of Cryptology and Information Security. Berlin : Springer-Verlag, 2002 : 548 - 566. 被引量:1
  • 8BARRETO P S L M, KIM H Y, LYNN B, et al. Efficient algorithms for pairing-based cryptosystems[ C ]//Proc of the 22nd Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag ,2002 : 354- 368. 被引量:1
  • 9GALBRAITH S D, HARRISON K, SOLDERA D. Implementing the Tate pairing[ C ]//Proc of the 5th International Symposium on Algorithmic Number Theory. London :Springer-Verlag,2002:324-337. 被引量:1
  • 10DUTTA R, BARUA R,SARKAR P. Pairing-based cryptographic protocols: a survey [ R/OL ]. ( 2004- 06- 24 ) [ 2008- 03- 12 ]. http :// eprint, iacr. org/2004/064. 被引量:1

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部