期刊文献+

适用于Ad Hoc网络的混合认证机制

Hybrid authentication mechanism for Ad Hoc networks
下载PDF
导出
摘要 分析了Ad Hoc网络的特点及其对身份认证机制的安全需求,采用椭圆曲线和对称密钥两种认证体制并结合自证明公钥原理,提出了一种适用于Ad Hoc网络的混合认证机制。该机制中门限方案增强了系统的健壮性,基于自证明公钥的双向认证协议确保了交互节点身份的真实性,刷新认证协议保证了节点身份的持续可信,分布式自证明公钥撤销方案可将恶意节点快速从系统中分离出去。分析结果表明,该认证机制具有较高的安全性,同时对系统存储空间、网络通信量和计算开销的要求都很少,有着较高的效率。 After analyzing the characteristics and the authentication secure requirements ofAd Hoc networks, based on ECC and symmetric key authentication system, a hybrid authentication mechanism is proposed, which combines self-certified public key theory.Threshold scheme enhances system more stable. Mutual authentication based on self-certified public key guarantees nodes to communi- cate with the right one. The renewal authentication protocol ensures the node' s identity be continuance trusted. While the distributed self-certified public key revocation scheme makes it practicable to draw malicious nodes away from Ad Hoc network. Analyses show that the scheme has higher security, more efficient and has advantages in storage, communication overheads and computation cost.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第15期3481-3483,3490,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2006AA701416 2007AA701309)
关键词 AD HOC网络 椭圆曲线 认证机制 自证明公钥 门限 Ad Hoc networks ECC authentication mechanism self-certified public key threshold
  • 相关文献

参考文献4

二级参考文献67

  • 1张倩,王福豹,滑楠,何戟.无线传感器网络CMR路由协议的设计与实现[J].计算机应用,2006,26(4):932-934. 被引量:2
  • 2Lidong Zhou, Haas Z J. Securing Ad Hoc Networks[J].Network, IEEE, 1999, 13(6) :24 - 30. 被引量:1
  • 3Kong J, Zerfos P, Luo H, et al. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks[A ]. In: IEEE Computer Society. 2001 International Conference on Network Protocols ICNP[ C]. Washington:IEEE Computer Society, 2001. 251- 260. 被引量:1
  • 4Housley R, Ford W, Polk W, et al. Intemet X. 509 Public Key Infrastructure Certificate and CRL Profile [ EB/OL]. http:∥www. ietf. org/rfc/rfc2459. txt, 1999. 被引量:1
  • 5Crepeau Claude, Davis Carlton R. A Certificate Revocation Scheme for Wireless Ad Hoc Networks[A]. In: Association for Computing Machinery. 1st ACM Workshop on Security of Ad Hoc and Security of Ad Hoc and Sensor Networks[ C]. New York: Association for Computing Machinery, 2003. 54- 61. 被引量:1
  • 6盛骤 谢式千 潘承毅.概率论与数理统计(第2版)[M].北京:高等教育出版社,1997.38-45. 被引量:3
  • 7Floyd S. High-Speed TCP for large congestion windows. RFC3649, 2003. 被引量:1
  • 8DataTAG. http://datatag.web.cern.ch/datatag/networking.html 被引量:1
  • 9Corson MS. Internet-Based mobile ad hoc networking. IEEE Internet Computing, 1999. 63-70. 被引量:1
  • 10Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38:393-422. 被引量:1

共引文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部