共查询到20条相似文献,搜索用时 109 毫秒
1.
2.
无线自组织网络是一种分布式无中心的多跳网络,具有网络拓扑结构不断变化、网络自治、易受攻击等特点,因而传统的密钥管理体制变得不再适合,而秘密共享体制则为自组织网络的密钥管理提供了一种有效途径。前向安全的密钥管理协议是在秘密共享基础上,结合前向安全的思想和基于标识加密公钥算法,支持共享密钥和密钥份额随时间周期更新的密钥管理方案。前向安全的密钥管理协议支持成员动态变化,适合无线自组织网络的密钥管理,相对于传统的密钥管理方式,其安全性有很大提高。 相似文献
3.
4.
5.
Ad Hoc网络是一种独具特色的网络,作为一种新型的无线,多跳、无中心分布式控制网络,它无需网络基础设施,具有很强的自组织性,鲁棒性.抗毁性和容易构建的特点,其安全问题一直是研究的热点和难点.文中提出了一种改进的基于椭圆曲线密码组合公嘲的ad hoc密钥管理方案.与原方案相比,除了保持快捷地计算出节点的公私钥对、扩展性好、无需证书等特性外,新方案进一步提高了ad hoc网络的安全性,避免了单点失败. 相似文献
6.
7.
8.
9.
10.
11.
公钥证书是公开密钥的重要载体。随着以Ad Hoc为代表的自组织网络、分布式网络的发展,需要安全的可对公钥证书的生成、发布、更新、验证、撤销等实现自治管理的自组织证书管理方案。论文提出了一种安全的证书自组织管理方案,该方案利用单向哈希链,实现了无在线可信第三方的证书自组织管理。该方案的安全性同时依赖于节点私钥与单项哈希链的安全,具有更好的安全特性。 相似文献
12.
Pei Qingqi Li Hongning Pang Liaojun Hao Yin Hong Tang Key Lab of Computer Networks Information Security of Ministry of Education Xidian University Xi’an China Institute of China Electronic System Engineering Corporation Beijing China 《中国通信》2010,7(1):73-79
Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system cannot guarantee the security of the wireless sensor network for communications, this paper introduces a hierarchical key management scheme based on the different abilities of different sensor nodes in the clustered wireless sensor network. In this scheme, the nodes are distributed into several clusters, and a cluster head must be elected for each cluster. Private communication between cluster heads is realized through the encryption system based on the identity of each head while private communication between cluster nodes in a same cluster head is achieved through the random key preliminary distribution system. Considering the characteristics of WSN, we adopt dynamic means called dynamic cluster key management scheme to deal with master key, so master key will be updated according to the changed dynamic network topology. For cluster head node plays a pivotal role in this scheme, a trust manage-ment system should be introduced into the election of the cluster head which will exclude the malicious node from outside the cluster, thus improve the whole network security. 相似文献
13.
Next generation high-speed cellular networks are expected to support multimedia applications, which require QoS provisions. Since frequency spectrum is the most expensive resource in wireless networks, it is a challenge to support QoS using limited frequency spectrum. In the literature, two orthogonal approaches are used to address the bandwidth utilization issue and the QoS provision issue; that is, channel allocation schemes have been proposed to improve bandwidth efficiency, whereas handoff management schemes, based on bandwidth reservation, have been proposed to guarantee a low connection dropping rate. However, little effort has been taken to address both issues together. In this paper, we integrate distributed channel allocation and adaptive handoff management to provide QoS guarantees and efficiently utilize the bandwidth. First, we present a complete distributed distributed channel allocation algorithm and propose techniques to reduce its message complexity and intra-handoff overhead. Second, we integrate the proposed distributed channel allocation algorithm with an adaptive handoff management scheme to provide QoS guarantees and efficiently utilize the bandwidth. Detailed simulation experiments are carried out to evaluate the proposed methodology. Compared to previous schemes, our scheme can significantly reduce the message complexity and intra-handoff overhead. Moreover, the proposed scheme can improve the bandwidth utilization while providing QoS guarantees. 相似文献
14.
Service-oriented vehicular networks support diverse infrastructure-based commercial services including Internet access, real-time traffic concerns, video streaming, and content distribution. The success of service delivery in vehicular networks depends on the underlying communication system to enable the user devices to connect to a large number of communicating peers and even to the Internet. This poses many new research challenges, especially in the aspects of security, user privacy, and billing. In this article we first identify the key requirements of authentication, privacy preservation, and billing for service delivery in vehicular networks. We then review the existing industrial and academic efforts on service- oriented vehicular networks. We also point out two security challenges, minimizing vehicleto- infrastructure authentication latency and distributed public key revocation, which are considered among the most challenging design objectives in service-oriented vehicular networks. A novel fast vehicle-to-infrastructure authentication based on a vehicle mobility prediction scheme and an infrastructure-based short-time certificate management scheme are then proposed to address these two challenges. 相似文献
15.
16.
17.
Significant attention has been focused on establishing a framework of standards and generic guidelines for a layered, distributed approach to network management for broadband transport networks. Initial field deployment trials based on these efforts, using SNCs (subnetwork controllers) or EMs (element managers), have just begun. The paper outlines early distributed management applications that are being considered for deployment in the 1995 time frame. The focus is on the key challenges that must be addressed in realizing initial field deployment of distributed broadband management applications 相似文献
18.
The Research on Handoff Strategy in Beyond 3G Wireless Networks 总被引:2,自引:3,他引:2
CUI Hong-yan TIAN Hui XU Hai-bo ZHANG PingCollege of Telecommunication Engineering Beijing University of Posts Telecommunications Beijing P.R. China 《中国邮电高校学报(英文版)》2006,13(2):26-30
1Introduction TheBeyondThirdGenerationMobileSystems(B3G)isabrandnewmobilitycommunicationsystembasedon IPv6corenetwork.B3Gcanprovidevariousservices withtheendtoendQoSguaranteeflexible,andthe transferdatarate150Mb/s.Itspeakratecanreach30~50Mb/sinlargecover… 相似文献
19.
适合ad hoc网络无需安全信道的密钥管理方案 总被引:4,自引:0,他引:4
密钥管理问题是构建ad hoc安全网络系统首要解决的关键问题之一.针对ad hoc网络特点,提出了一个无需安全信道的门限密钥管理方案.该方案中,可信中心的功能由局部注册中心和分布式密钥生成中心共同实现,避免了单点失效问题;通过门限技术,网络内部成员相互协作分布式地生成系统密钥;利用基于双线性对的公钥体制实现了用户和分布式密钥生成中心的双向认证;通过对用户私钥信息进行盲签名防止攻击者获取私钥信息,从而可以在公开信道上安全传输.分析表明该方案达到了第Ⅲ级信任,具有良好的容错性,并能抵御网络中的主动和被动攻击,在满足ad hoc网络安全需求的情况下,极大地降低了计算和存储开销. 相似文献
20.
《Communications Magazine, IEEE》2000,38(11):94-98
This article proposes a network paradigm called the single-server-view network as the basis for networks in the 21st century, when the value of a network to users will be based on the services provided rather than data communication capability. Based on our paradigm, we propose a double-plane network architecture, consisting of a simplified data forwarding plane and a service control plane, that performs all the complex processing tasks. The data forwarding plane uses an advanced photonic network as its basis. The service control plane consists of agent, service, and policy control layers with open interfaces between layers. Leading-edge information processing technologies, such as active node, agent, distributed processing, and policy-based management, are used in this plane. Since mobile communication is becoming a major access technology, an approach to integrating mobile and fixed networks into this framework is also proposed. The current status of key technologies, such as photonic networks, agent technology, and policy-based management, are reported. 相似文献