期刊文献+

一种证券业务移动终端密钥更新的无线分发技术研究

Research on a kind of wireless distribution technology for key update of mobile terminal of securities business
下载PDF
导出
摘要 证券业务数据具有较高的私密性需求,因此在个人移动终端密钥进行更新可以降低数据的泄露风险。目前密钥主要使用Internet接入、GPRS等公网进行分发。传统的密钥分发方式导致成本高、安全性较低的问题。因此文章依据行人移动距离基于幂截顶分布的规律,提出基于延迟容忍移动传感器网络技术的无线密钥分发方案。通过仿真实验验证终端覆盖率,结果显示基于洪泛方法的密钥分发方式,移动节点更新率在81小时后达到90%,并减少了密钥在公网中的传输机会。 The securities business data has high confidentiality requirements, thus the update of personal terminal key can decrease the risk of data leakage. At present, the key uses Internet to access and GPRS network to distribute. Traditional key distribution mode leads to high cost and low security, therefore according to the rule that the pedestrian distance distribution is based on power cut top, this paper puts forward a wireless key distribution scheme based on delay tolerant mobile sensor network technology. Terminal coverage is verified by simulation experiments, and results show that based on the flooding method of key distribution, the update rate of mobile nodes in 81 hours reached to 90% and transmission chance of secret key in public network is reduced.
作者 李琪 Li Qi(Shenwan Hongyuan Securities Co., Ltd., Chengdu 610000, China)
出处 《无线互联科技》 2017年第2期16-18,共3页 Wireless Internet Technology
基金 四川省科技厅软科学项目 项目编号:2014ZR0146
关键词 私密性 密钥分发 延迟容忍移动传感器网络 节点更新率 privacy secret key distribution delay tolerant mobile sensor networks node update ratio
  • 相关文献

参考文献6

二级参考文献35

  • 1刘明,龚海刚,毛莺池,陈力军,谢立.高效节能的传感器网络数据收集和聚合协议[J].软件学报,2005,16(12):2106-2116. 被引量:65
  • 2Coronato A, Pietro G. A framework for engineering pervasive appli-cations applied to intra--vehicular sensor network applications, mo- bile networks and applications [J]. Computer and Information Sci- ence. 2010, 15 (1): 137-147. 被引量:1
  • 3Juang P, Oki H. Energy--efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet [A]. Proceed- ings of The 10th International Conference on Architectural Support for Programming Languages and Operating Systems [C]. San Jose, CA, 2002: 96- 107. 被引量:1
  • 4Leguay J, Friedman T, Conan V. DTN routing in a mobility pattern space [A]. In Proceedings of ACM SIGCOMM'05 Workshop on De- lay Tolerant Networking and Related Topics, Philadelphia [C]. ACM Press, 2005: 276-283. 被引量:1
  • 5Sanjit B, Robert M. Opportunistic routing in multi--hop wireless networks [J]. ACM SIGCOMM Computer Communication Re- view. 2004, 34 (1): 69-74. 被引量:1
  • 6Wang Y, Wu H Y. Delay/fault--tolerant mobile sensor network (DFT--MSN) : a new paradigm for pervasive information gathering [J]. IEEE Transactions on Mobile Computing. 2007, 6 (9) : 1021 - 1034. 被引量:1
  • 7Spyropoulos T, Psounis K, Raghavendra C S. Efficient routing in intermittently connected mobile networks: the multiple--copy case [J]. IEEE/ACM Transactions on Networking. 2008, 16 (1) : 77 - 90. 被引量:1
  • 8Mundur P, Seligman M. Delay tolerant network routing: Beyond epidemic routing [A]. The 3rd International Symposium on Wire- less Pervasive Computing, Santorini, Greece [C]. 2008: 550 -553. 被引量:1
  • 9Heinzelman W B, Chandrakasan A P, Balakrishnan H. An applica- tion- specific protocol architecture for Wireless micro--sensor net- works [J]. IEEE Transactions on Wireless Communications. 2002, 1 (4) : 660- 670. 被引量:1
  • 10Camp T, Boleng J, Davies V. A survey of mobility models for ad hoc network research [J]. Wireless Communication and Mobile Computing, 2002, 2 (5): 483-502. 被引量:1

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部