一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

無線Ad hoc網(wǎng)動(dòng)態(tài)密鑰管理問題的研究

傅堅(jiān) 張翎

傅堅(jiān), 張翎. 無線Ad hoc網(wǎng)動(dòng)態(tài)密鑰管理問題的研究[J]. 電子與信息學(xué)報(bào), 2006, 28(5): 815-819.
引用本文: 傅堅(jiān), 張翎. 無線Ad hoc網(wǎng)動(dòng)態(tài)密鑰管理問題的研究[J]. 電子與信息學(xué)報(bào), 2006, 28(5): 815-819.
Fu Jian, Zhang Ling. The Research on the Dynamic Key Management of Wireless Ad hoc Network[J]. Journal of Electronics & Information Technology, 2006, 28(5): 815-819.
Citation: Fu Jian, Zhang Ling. The Research on the Dynamic Key Management of Wireless Ad hoc Network[J]. Journal of Electronics & Information Technology, 2006, 28(5): 815-819.

無線Ad hoc網(wǎng)動(dòng)態(tài)密鑰管理問題的研究

The Research on the Dynamic Key Management of Wireless Ad hoc Network

  • 摘要: 作為一類自組織動(dòng)態(tài)網(wǎng)絡(luò),無線Ad hoc網(wǎng)面臨著嚴(yán)重的安全威脅。該文在分析Ad hoc網(wǎng)絡(luò)特點(diǎn)的基礎(chǔ)上,提出一種基于擴(kuò)展Diffie-Hellman交換的分級(jí)組密鑰管理方案(HGKM)。HGKM協(xié)議采用分級(jí)架構(gòu),利用成員過濾函數(shù)維護(hù)統(tǒng)一的組密鑰,有效減少密鑰更新對(duì)Ad hoc網(wǎng)性能的影響。
  • Stajano F, Anderson R. The resurrecting duckling: security issuesfor Ad-hoc wireless networks. Proceedings of 7PthP InternationalWorkshop on Security Protocols, Berlin Germany,Springer-Verlag, 1999: 172-194.[2]Fordigh M, Johansson P, Larsson P. Wireless Ad hoc networkingthe art of networking without a network. Ericsson Review,2000: 125-131.[3]Charles Perkins, Ad hoc networks. Addison Wesley Editions,2001.[4]Steiner M, Tsudik G, Waidner M. Diffie-Hellman key distributionextended to group communication. 3PrdP ACM Conference onComputer and Communications Security, New Delphi, India,1996: 31-37.[5]Jalel Ben Othman, Xiaoyun Xue. Security equipment in Ad hocnetworks, IEEE VTC 2002: 1819-1823.[6]Mike Burmester, Yvo Desmedt. A secure and efficient conferencekey distribution system[J].Advances in Cryptology-EUROCRYPT94, Perugia, Italy.1994, 950:275-286[7]Klaus Becker, Uta Wille. Communication complexity of groupkey distribution. Proc. 5PthPACM Conference on Computer andCommunications Security, San Francisco, USA, 1998: 1-6.[8]Diffie W, Hellman M. New directions in cryptography. IEEETrans. on Information Theory, 6(1976), 644-654.[9]Kuen-Pin Wu, Shang-Jang Ruan, Feipei Lai, et al.. On keydistribution in secure multicasting. 25PthP Annual IEEE Conferenceon Local Computer Networks, 2000: 208-212.[10]Fengji Ye, Su Yi, Biplab Sikdar. Improving spatial reuse of IEEE802.11 based ad hoc networks. GLOBECOM 200, IEEE GlobalTelecommunications Conference, 2003, 22(1): 1013-1017.[11]Beller M J, Yacobi Y. Fully-fledged two-way public keyauthentication and key agreement for low-cost terminals[J].Electronics Letters.1993, 29(11):999-1001[12]Y. Amir, G Ateniese, D Hasse, et al.. Secure groupcommunication in asynchronous networks with failures:Integration and experiments. IEEE ICDS, 2000: 330-343.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  2153
  • HTML全文瀏覽量:  128
  • PDF下載量:  741
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2004-08-16
  • 修回日期:  2005-06-27
  • 刊出日期:  2006-05-19

目錄

    /

    返回文章
    返回