期刊文献+

一种高效的多播源认证协议与仿真实现 被引量:2

Efficient Multicast Source Authentication Protocol and Simulation
下载PDF
导出
摘要 首次提出了一种安全高效的触发式多播源认证协议,解决了TESLA协议中存在的密钥使用率低和通信量高的问题。结合随机概率转发机制,降低因网络丢包导致的认证时延增大问题并提高报文交付率。性能分析和仿真结果显示在连续密集的广播报文流条件下,协议具备了TESLA协议相同的性能。在稀疏或随机的广播报文流条件下,能将密钥使用率提高约36倍,并减少通信量约5.1倍,显著优于TESLA协议,该性能会随着广播报文速率的降低进一步的提高。 An efficient triggered multicast source authentication protocol was put forward. This protocol can offer higher utilization ratio of key and lower communication overload, which remain problems in TESLA. The probabilistic resilient multicast scheme was combined to reduce the authentication delay and packet loss in network. Simulation results show that this protocol possesses the same performances with TESLA under the condition of intensive broadcast rates. However, under the condition of sparse or random broadcast rates, it can improve utilization ratio of key by about 36 times and reduce the communication overloads by about 5.1 times than TESLA, and this performance will be further increased with lower of broadcast rates.
出处 《系统仿真学报》 EI CAS CSCD 北大核心 2007年第10期2216-2221,共6页 Journal of System Simulation
基金 国家自然科学基金(90304015) 江苏省自然科学基金项目(BK2006003)
关键词 多播 源认证 触发式 TESLA 单向密钥链 multicast source authentication triggered TESLA one-way key chain
  • 相关文献

参考文献13

  • 1Li Mingyan,Poovendran R.Design of Secure Multicast Key Management Schemes with Communication Budget Constraint[J].IEEE Communications Letters (S1089-7798),2002,6(3):108-111. 被引量:1
  • 2Castro Miguel,Druschel Peter.Anne-Narie Kermarrec,etal.Scribe:A Large-scale and Decentralized Application-level Multicast Infrastructure[J].IEEE Journal on Selected Areas in Communications (S0733-8716),2002,20(8):1489-1499. 被引量:1
  • 3Mittra S.Iolus:A framework for scalable secure multicasting[J].ACM SIGCOMM Computer Communication Review (S0146-4833),1997,27(4):277-288. 被引量:1
  • 4M Waldvogel,G Caronni,D Sun,et al.The versa key framework:versatile group key management[J].IEEE JSAC (S0733-8716),1999,17(9):1614-1631. 被引量:1
  • 5Amir Yair,Kim Yongdae,Tsudik Gene.On the Performance of Group Key Agreement Protocols[C]// Distributed Computing Systems,2002.Proceedings.22nd International Conference,Los Alamitos:IEEE Press.2002. 被引量:1
  • 6Lamport L.Constructing Digital Signatures from a One-way Function[R].SRI International Technical Report CSL-98,1979. 被引量:1
  • 7Gennaro Rosario,Rohatgi Pankaj.How to Sign Digital Streams[R].IBM T.J.Watson Research Center,1997. 被引量:1
  • 8Canetti Ran,Garay Juan,Itkis Gene.Multicast security:A taxonomy and some efficient constructions[C]// Infocom'99.New York:IEEE Press.1999. 被引量:1
  • 9Wong C K,Lam S S.Digital Signatures for Flows and Multicasts[J].IEEE/ACM Trans on Networking (S1063-6692),1999,7(4):504-509. 被引量:1
  • 10Rohatgi Pankaj.A compact and fast hybrid signature scheme for multicast packet authentication[C]// 6th ACM Conference on Computer and Communications Security.Singapore:ACM Press.1999. 被引量:1

同被引文献13

  • 1AYDAY E, DELGOSHA F, FEKRI F. Efficient broadcastauthentication for wireless sensor networks [ C ] //Networking Technologies for Software Define RadioNetworks. San Diego : IEEE, 2007 : 61-62. 被引量:1
  • 2PERRIG A, SZEWCZYK R, WEN V, et al. SPINS:security protocols for sensor networks [ J ]. Journal ofWireless Networks, 2002, 8(5) : 521-534. 被引量:1
  • 3KIMURA N , LATIFI S. A survey on data compression inwirelesss sensor networks [ C ] // Proc of the Int'l Conf onInformation Technology: Coding and Computing. LasVegas: IEEE, 2005: 8-13. 被引量:1
  • 4LEBEAU A, FIELDS J, LAVERING R. Improving non-stationary data retrieval in wireless sensor networks [ C ] //IEEE Percom Workshop on Sensor Networks and Systemsfor Pervasive Computing. San Diego : IEEE, 2005 : 213-217. 被引量:1
  • 5LIU D, NING P. Efficient distribution of key chaincommitments for broadcast authentication in distributedsensor networks [ C ] // Proceedings of the 10th AnnualNetwork and Distributed System Security Symposium(NDSS 03). Raleigh: IEEE, 2003: 263-276. 被引量:1
  • 6LIU D, NING P. Multi-level ^TESLA: broadcastauthentication for distributed sensor networks [ J ]. ACMTransactions in Embedded Computing Systems ( TECS ),2004,3(4) : 800-836. 被引量:1
  • 7LIU D,NING P, ZHU S,et al. Practical broadcastauthentication in sensor networks [ C ] // Proceedings of theSecond Annual International Conference on Mobile andUbiquitous Systems. San Diego: IEEE, 2005 ; 118-129. 被引量:1
  • 8MERKLE R. Protocols for public key cryptosystems [ C ] //Proceedings of the IEEE Symposium on Research inSecurity and Privacy. Oakland : IEEE, 1980 : 122-134. 被引量:1
  • 9KARLOF C , SASTRY N, LI Y,et al. Distillation codesand applications to DoS resistant multicast authentication[C ] // Proc 11th Network and Distributed SystemsSecurity Symposium (NDSS). San Diego: IEEE, 2004:12-17. 被引量:1
  • 10蒋毅,史浩山,赵洪钢.基于分级Merkle树的无线传感器网络广播认证策略[J].系统仿真学报,2007,19(24):5700-5704. 被引量:10

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部