期刊文献+

Ad Hoc网络中基于分簇的安全撤销方案

Secure Revocation Scheme Based on Clustering in Ad Hoc Networks
下载PDF
导出
摘要 基于分簇结构提出一种Ad Hoc网络安全撤销方案。采用基于身份的密码算法,不需要公钥证书的存在,使用Beta信誉模型为网络中节点预测簇内其他节点的行为提供理论完善的基础。结合门限机制实现节点的撤销,避免簇头撤销权力的集中,可解决节点簇间漫游的安全隐患,增强网络的安全性。 This paper presents a secure revocation scheme for cluster-based Ad Hoc networks. This scheme uses ID-based signcryption and public key certificates are not needed. It offers a theoretically sound basis for a node in Mobile Ad Hoc Networks(MANETs) to predict the behavior of other nodes in the same cluster by using Beta reputation system. Combining with threshold mechanism to realize the revocation of nodes, it provides protection against the power of revocation being controlled. It defects in the roaming of mobile nodes and enhances security.
作者 莫杰 王晓明
出处 《计算机工程》 CAS CSCD 北大核心 2010年第12期179-181,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60773083) 广东省自然科学基金资助项目(8151063201000022)
关键词 撤销 AD HOC网络 基于身份的密码体系 分簇 revocation Ad Hoc networks identity-based cryptograph system clustering
  • 相关文献

参考文献6

  • 1Bechler M,Hof H J,Kraft D,et al.A Cluster-based Security Architecture for Ad Hoc Networks[C] //Proc.of IEEE International Conference on Wireless and Mobile Computing,Networking and Communications.[S.l.] :IEEE Press,2006:391-396. 被引量:1
  • 2李光松,韩文报.分簇Ad Hoc网络的密钥管理[J].计算机科学,2006,33(2):79-82. 被引量:6
  • 3Jφsang A,Ismail R.The Beta Reputation System[C] //Proc.of the 15th Bled Electronic Commerce Conference.Bled,Slovenia:[s.n.] ,2002:324-337. 被引量:1
  • 4Hoeper K,Gong Guang.Key Revocation for Identity-based Schemes in Mobile Ad Hoc Networks[C] //Proc.of the 5th International Conference on Ad Hoc,Mobile,and Wireless Networks.[S.l.] :IEEE Press,2006:224-237. 被引量:1
  • 5Fan Xinxin,Gong Guang.Key Revocation Based on Dirichlet Multinomial Model for Mobile Ad Hoc Networks[C] //Proc.of the 33rd IEEE Conference On Local Computer Networks.[S.l.] :IEEE Press,2008:14-17. 被引量:1
  • 6张晓宁,冯登国.无线自组网络中基于簇结构的安全方案[J].计算机研究与发展,2006,43(2):238-243. 被引量:6

二级参考文献18

  • 1Lidong Zhou, Zygmunt J. Haas. Securing ad hoc networks. IEEE Network Magazine, 1999, 13(6): 24-30. 被引量:1
  • 2J. Kong, P. Zerfos, H. Luo, et al. Providing robust and ubiquitous security support for mobile ad hoc networks. IEEE ICNP (Int'l Conf, Network Protocols), Riverside, California,2001. 被引量:1
  • 3Jean-Pierre Hubaux. L. Buttyan. S. Capkun. The quest for security in mobile ad hoc networks, The 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing.Long Beach,California. 2001. 被引量:1
  • 4Claude Crepeau, Carlton R. Davis. A certificate revocation scheme for wireless ad hoc networks. The 1st ACM Workshop Security of Ad Hoc and Sensor Networks, Falrfax, Virginia, 2003. 被引量:1
  • 5MingliangJiang. Jinyang Li, Y. C. Tay. Cluster based routing protocol, http://cram. comp. nus. edu. sg/ebrp/draft-ietf-manet-ebrp-spec-01, txt. 1999-08. 被引量:1
  • 6L. Venkatraman, DI P. Agrawal. A novel authentication scheme for ad hoc networks. IEEE Wireless Communications and Networking Conf, Chicago, IL, USA, 2000. 被引量:1
  • 7M, Bechler, H, J. Hof, D. Kraft, et al. A cluster-based security architecture for ad hoe networks. IEEE INFOCOM 2004, Hong Kong, 2004. 被引量:1
  • 8Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, et al.An on-demand secure routing protocol resilient to Byzantine failures. ACM Workshop on Wireless Security (WiSe) 2002,Atlanta, Georgia, 2002. 被引量:1
  • 9Zhou L,Haas Z J.Securing Ad hoc Networks.IEEE Networks,1999,13(6):24~30 被引量:1
  • 10Desmedt Y.Threshold cryptography.European Transactions on Telecommunications,1994,5(4):449~457 被引量:1

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部