期刊文献+

基于身份密码的机载自组织网络动态密钥管理 被引量:7

Identity Based Dynamic Key Management of Airborne Ad Hoc Network
下载PDF
导出
摘要 针对现有机载自组织网络密钥管理存在的预分配密钥更新困难、公钥证书传递开销大、分布式身份密钥传递需要安全信道的问题,该文提出一种无需安全信道的基于身份密码体制的动态密钥管理方案。该方案包括系统密钥自组织生成和用户私钥分布式管理两个算法;采取遮蔽密钥的办法,确保私钥在公共信道中全程安全传递,使得密钥管理易于部署、方便扩展;最后分析了方案的正确性与安全性。结果证明方案理论正确,能够抵抗假冒、重放、中间人攻击。 Because of nowadays airborne network's updating difficulty of pre-allocated symmetrical key, high communication cost of public key certificate and the requirement of security channel for distributed identitybased key management, identity-based dynamic key management of airborne network is proposed. It is composed of two algorithms: self-organized generation of master key without the trusted third party and distributed management of user's private key. Moreover, the master key share and user private partition can be delivered without the pre-established security channel by blinding them so that the scheme is easy to develop and flexible to extend. Finally, the correctness and security of the proposed scheme are proved, it is shown that it can provide the ability to resist the impersonation attack, replay attack and man-in-the-middle attack.
作者 王宏 李建华 赖成喆 WANG Hong;LI Jianhua;LAI Chengzhe(Information and Navigation College,Air Force Engineering University,Xi'an 710077,China;Information and Communication College,National University of Defense Technology,Xi'an 710106,China;Xi' an University of Posts & Telecommunications,Xi' an 710121,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2018年第8期1985-1991,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61401499 61502386)~~
关键词 机载网络 身份密码体制 密钥管理 自组织 分布式 Airborne network Identity-based cryptography Key management Self-organized Distributed
  • 相关文献

参考文献7

二级参考文献113

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2杨德明,慕德俊,许钟.Ad hoc空间网络密钥管理与认证方案[J].通信学报,2006,27(8):104-107. 被引量:17
  • 3陈立家,江昊,吴静,郭成城,徐武平,晏蒲柳.车用自组织网络传输控制研究[J].软件学报,2007,18(6):1477-1490. 被引量:46
  • 4ZHOU L D, HASS Z J. Securing ad hoc networks[J]. IEEE Network, Special Issue on Network Security, 1999, 13(6): 24-30. 被引量:1
  • 5DA SILVA E, DOS SANTOS A, ALBINI L C E et al. Identity-based key management in mobile ad hoc networks: techniques and applications[J]. IEEE Wireless Communications, 2008, 15(5): 46-52. 被引量:1
  • 6LUO H, ZEFROS P, KONG J, et al. Self-securing ad hoc wireless networks[A]. Proceeding of the Seventh IEEE Symposium on Computers and Communications (ISCC'02)[C]. Taormina, Italy, 2002. 548-555. 被引量:1
  • 7KHALILI A, KATZ J. Toward secure key distribution in truly Ad-Hoc networks[A]. Proceedings of the Symposium on Applications and the Internet Workshops (SAINT03)[C]. Orlando, FL, USA, 2003. 342-346. 被引量:1
  • 8BONEH D, FRANKLIN M K. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3): 586-615. 被引量:1
  • 9DENG H, MUKHERJEE A, AGRAWAL D E Threshold and identity-based key management and authentication for wireless ad hoe networks[A]. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)[C]. Las Vegas, USA, 2004. 107-110. 被引量:1
  • 10SUI A, CHOW S, HUI L, et al. Separable and anonymous identity-based key issuing without secure channel[A]. Proceedings of the 1st International Workshop on Security in Networks and Distributed Systems (SNDS'05)[C]. Fukuoka, Japan, 2005. 275-279. 被引量:1

共引文献79

同被引文献42

引证文献7

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部