期刊文献+

Ad Hoc网络环境下分布式密钥管理 被引量:9

Distributed Key Management for Ad Hoc Network
原文传递
导出
摘要 分析了当前Ad Hoc网络密钥管理方面的若干方案,根据椭圆曲线密码体制(ECC)可以使用较短的密钥满足较高的安全性需求特点,提出了一种新的基于ECC的分布式密钥管理方案,详细给出了该方案包括主密钥产生、新节点加入和私钥产生等在内的具体实施步骤,并以证书更新服务为例对证书服务性能进行了模拟测试.结果表明,该方案具有较高的安全性,证书服务的有效性和较好的鲁棒性. We briefly survey the recent works regarding key management of Ad Hoc network,and then analyze elliptic curve cryptography(ECC) that is appropriate for Ad Hoc network mainly owing to its smaller key size and a high security level.Following this lead,we further propose a practical distributed CA-based key management scheme for Ad Hoc network based on ECC,which includes key generation,new node entry and share refreshing.Finally,share refreshing of this scheme is simulated.The simulation proves that the scheme can improve the security,efficiency and robustness of Ad Hoc network.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2009年第1期85-88,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家高技术研究发展计划(863)项目(2008AA01Z404)
关键词 ADHOC网络 密钥管理 椭圆曲线密码算法 Ad Hoc network key management ellipse curve cryptography ellipse
  • 相关文献

参考文献14

  • 1Zhou L, Hass Z J. Securing Ad Hoe Networks[J]. IEEE Network Magazine, 1999,13(6) :24-30. 被引量:1
  • 2Luo H,Zerfos P,Kong J,et al. Self-Securing Ad Hoe Wireless Network[ C ]/ / Seventh IEEE Symposium on Computers and Communications. Taormina: IEEE Press, 2002 : 567. 被引量:1
  • 3Fokin K. Key Management in Ad Hoc Networks[EB/ OL]. [2008-01-11 ]. http ://www. computer. org/. 被引量:1
  • 4Manulis M. Key Agreement for Heterogeneous Mobile Ad-Hoc Groups[C]//Proceedings of the 2005 11th International Conference on Parallel and Distributed Systems. Washington D C:IEEE Press,2005:375. 被引量:1
  • 5Yi S,Kravets R. Key Management for Heterogeous Ad Hoc Wireless Network[C]//10th IEEE International Conference on Network Protocols. New York: IEEE Press, 2002 : 165. 被引量:1
  • 6Kong J,Zerfos P,Luo H,et al. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoe Networks [ C ]/ / IEEE 9th International Conference on Networks Protocol. New York: IEEE Press, 2001 : 324. 被引量:1
  • 7Kong J,Zerfos P, Luo H ,et al. Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks [J]. ACM Transactions on Networking ,2004,12(6) : 1049- 1063. 被引量:1
  • 8许俊杰,曾贵华.基于椭圆曲线的Ad hoc网络门限身份认证方案[J].计算机工程与应用,2007,43(17):117-118. 被引量:7
  • 9Shamir A. How to Share a Secrete[J]. Communications of the ACM, 1979,22(11) : 612-613. 被引量:1
  • 10Simmons G J. How to (Really) Share a Seerete[EB/ OL]. [2007-12-16]. http://csdl2.computer. org/. 被引量:1

二级参考文献10

  • 1Shamir A.How to share a secret[J].Commun ACM,1979,24(11). 被引量:1
  • 2Zhou L,Haas Z J.Securing ad hoc networks[J].IEEE,Networks,1999,13(6):24-30. 被引量:1
  • 3Venkatraman L,Agrawal D P.A novel authentication scheme for ad hoe networks[C]//Wireless Communications and Networking Conference,IEEE,23-28 Sept,2000,3:1268-1273. 被引量:1
  • 4Yao Jun,Zeng Gui-hua.Key agreement and Identity Authentication Protocols for Ad hoc networks[C]//International Conference of Information Technology,ITCC 2004.IEEE,2004,2:720-724. 被引量:1
  • 5HAN Yi-liang,YANG Xiao-yuan,SUN Jun,et al.Verifiable threshold cryptosystems based on elliptic curve[C]//Proceedings of the 2003 International Conference on Computer Network and Mobile Computing(ICCNMC'03),2003(10):334-337. 被引量:1
  • 6Silverman J H.The arithmetic of elliptic curves[M].[S.l.]:Springer-Verlag,1986. 被引量:1
  • 7RFC 3174.US Secure Hash Algorithm 1(SHA1). 被引量:1
  • 8RFC 2631.Diffie-Hellman Key Agreement Method[S].E.Rescorla.1999-06. 被引量:1
  • 9NIST.Recommendation for key management-part:general.Special Publication 800-57,2005-08. 被引量:1
  • 10Certicom Press.Certicom announces Elliptic Curve Cryptosystem (ECC)Challenge winner[EB/OL].http://www.certicom.com/index.php?action=company,press_archive&view=121. 被引量:1

共引文献6

同被引文献67

引证文献9

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部