首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
戴冬  王果  王磊 《电视技术》2015,39(19):63-67
为了在无线传感器网络(WSN)中保证安全等级的情况下最小化通信和计算成本,提出了一种带消息恢复机制的基于配对密码学的广播认证协议。该机制不需要同时传输原始签名信息和新生成的签名信息,认证/消息恢复过程能自动恢复原始签名信息。首先初始化系统,基站产生系统参数;然后用户从基站获取密钥,访问WSN;最后当用户需要广播消息给WSN时,用户使用包含消息恢复机制的身份签名(IBS)协议写下签名消息,生成签名后进行消息广播。实验性能分析表明,与IMBAS和IDBAS相比,本文协议的广播消息大小分别减少了30%和22.3%,在112比特位安全等级,总能耗至少减少30%左右,在80比特位安全等级至少可降低15%的总能耗。  相似文献   

2.
陈泽茂  黄碧翼  李铮 《电信科学》2012,28(12):65-70
PKI认证机制由于效率原因,不宜直接应用于无线网络环境.本文引入可信证书验证代理(TCVP),设计了一个基于公钥密码的无线接入认证协议.该协议中,TCVP基于PKI认证无线移动节点的身份,并为其签发证书有效性凭据(CVT).在无线接入过程中,移动节点仅需出示CVT,即可证明其身份,无需在线验证接入网关证书的有效性,减少了认证协议的消息数量和大小.与SSL和WTLS的对比分析表明,该协议具有更高的效率.  相似文献   

3.
朱云 《光通信研究》2008,34(4):59-62
由于现有的认证机制不能有效解决会话初始协议(SIP)消息传送时网络侦听的问题,因此SIP网络传输时存在易遭受异常消息攻击、数据包被侦听、密文被分析等诸多安全威胁.文章经比较分析、研究改进,应用一个并行多进程的SIP非法消息检测流程,扩展了SIP认证头域,引进了密文隐写系统,能有效保证应用层的安全.实验结果验证了该方案的有效性.  相似文献   

4.
车联网(VANETs)是组织车-X(X:车、路、行人及互联网等)之间的无线通信和信息交换的大型网络,是智慧城市重要组成部分。其消息认证算法的安全与效率对车联网至关重要。该文分析王大星等人的VANETs消息认证方案的安全不足,并提出一种改进的可证安全的无证书聚合签名方案。该文方案利用椭圆曲线密码构建了一个改进的安全无证书聚合认证方案。该方案降低了密码运算过程中的复杂性,同时实现条件隐私保护功能。严格安全分析证明该文方案满足VANETs的安全需求。性能分析表明该文方案相比王大星等人方案,较大幅度地降低了消息签名、单一验证以及聚合验证算法的计算开销,同时也减少了通信开销。  相似文献   

5.
一种基于WLAN的分布式MAC认证策略   总被引:1,自引:0,他引:1  
文章分析了WLAN系统集中式MAC认证的优缺点,基于多维表决选举算法提出了一种分布式MAC认证策略,该策略通过动态构建选举群,将认证消息限制在有限的区域内,减少了广播消息对频宽资源的占用,对于大规模无线局域网认证及访问控制,该策略具有可靠性高、频宽占用低等特点。  相似文献   

6.
引言 在信息安全领域中,常见的信息保护手段大致可以分为保密和认证两大类.目前的认证技术有对用户的认证和对消息的认证两种方式.用户认证用于鉴别用户的身份是否是合法用户;消息认证就是验证所收到的消息确实是来自真正的发送方且未被修改的消息,也可以验证消息的顺序和及时性.  相似文献   

7.
UC安全的基于一次签名的广播认证   总被引:1,自引:0,他引:1  
研究了基于一次签名的广播认证协议的可证明安全问题.在通用可组合安全框架下,提出了基于一次签名的广播认证的安全模型.首先,形式化定义了一次签名理想函数FOTS和广播认证理想函数FBAUTH.其次,设计了一次签名算法HORS+.然后,在(FOTS,FREG)-混合模型下设计了广播认证方案πBAUTH.组合协议HORS+,在πBAUTH的基础上可以构造出新的基于一次签名的广播认证协议.结果表明,HORS+能够安全实现FOTS:在(FOTS,FREG)-混合模型下,πBAUTH安全实现理想函数FBAUTH的广播认证方案πBAUTH.根据组合定理,新的广播认证协议具有通用可组合安全性适用于能量受限网络中广播消息的认证.  相似文献   

8.
量子消息认证协议   总被引:3,自引:0,他引:3  
吕欣  马智 《通信学报》2005,26(5):44-49
研究了在量子信道上实现经典消息和量子消息认证的方法。给出了一个基于量子单向函数的非交互式经典消息认证加密协议。证明了给出的协议既是一个安全的加密方案,也是一个安全的认证方案。利用该认证加密协议作为子协议,构造了一个量子消息认证方案,并证明了其安全性。与BARNUM等给出的认证方案相比,该方案缩减了通信双方共享密钥的数量。  相似文献   

9.
郑明辉  崔国华  祝建华 《电子学报》2008,36(7):1368-1372
 一个非认证的多方密钥协商协议不能对通信参与方和消息进行认证,它必须依赖认证的网络信道或其他的认证方法.分析了Horng在认证广播信道下提出的高效多方密钥协商协议,指出它不能抵抗内部恶意参与方发起的密钥协商阻断攻击,该攻击导致通信的其他诚实参与方不能正确计算出相同的共享密钥.提出了一种安全的多方密钥协商协议,在Horng协议中加入了消息正确性的认证方法,能够检测出组内恶意参与方,并在随机预言模型下证明了提出的协议能够抵抗密钥协商阻断攻击.  相似文献   

10.
本文在Windows操作系统中研究并实现了三种截获用户鼠标行为数据的方法:消息钩子、WM_INPUT消息处理和过滤驱动,并从采样时钟分辨率、时间精度和位置信息等方面分析了不同方法所获取数据之间的区别.本文实验中同时使用这三种方法获取了多个用户的鼠标行为数据,从特征层面对不同数据截获方法带来的影响进行了对比分析,并利用神经网络分类器构建了身份认证模型,对使用不同方法下采集的鼠标行为数据进行用户身份认证的效果进行了实验研究.结果表明由三种数据截获方法采集到的数据都取得了较好的身份认证效果,其中使用消息钩子获取的数据进行认证的准确率最高,达到了94%以上.  相似文献   

11.
From its emergence in the late 1980s as a lower cost alternative to early EEPROM technologies, flash memory has evolved to higher densities and speedsand rapidly growing acceptance in mobile applications.In the process, flash memory devices have placed increased test requirements on manufacturers. Today, as flash device test grows in importance in China, manufacturers face growing pressure for reduced cost-oftest, increased throughput and greater return on investment for test equipment. At the same time, the move to integrated flash packages for contactless smart card applications adds a significant further challenge to manufacturers seeking rapid, low-cost test.  相似文献   

12.
The parallel thinning algorithm with two subiterations is improved in this paper. By analyzing the notions of connected components and passes, a conclusion is drawn that the number of passes and the number of eight-connected components are equal. Then the expression of the number of eight-connected components is obtained which replaces the old one in the algorithm. And a reserving condition is proposed by experiments, which alleviates the excess deletion where a diagonal line and a beeline intersect. The experimental results demonstrate that the thinned curve is almost located in the middle of the original curve connectivelv with single pixel width and the processing speed is high.  相似文献   

13.
The relation between the power of the Brillouin signal and the strain is one of the bases of the distributed fiber sensors of temperature and strain. The coefficient of the Bfillouin gain can be changed by the temperature and the strain that will affect the power of the Brillouin scattering. The relation between the change of the Brillouin gain coefficient and the strain is thought to be linear by many researchers. However, it is not always linear based on the theoretical analysis and numerical simulation. Therefore, errors will be caused if the relation between the change of the Brillouin gain coefficient and the strain is regarded as to be linear approximately for measuring the temperature and the strain. For this reason, the influence of the parameters on the Brillouin gain coefficient is proposed through theoretical analysis and numerical simulation.  相似文献   

14.
Today, micro-system technology and the development of new MEMS (Micro-Electro-Mechanical Systems) are emerging rapidly. In order for this development to become a success in the long run, measurement systems have to ensure product quality. Most often, MEMS have to be tested by means of functionality or destructive tests. One reason for this is that there are no suitable systems or sensing probes available which can be used for the measurement of quasi inaccessible features like small holes or cavities. We present a measurement system that could be used for these kinds of measurements. The system combines a fiber optical, miniaturized sensing probe with low-coherence interferometry, so that absolute distance measurements with nanometer accuracy are possible.  相似文献   

15.
A new quantum protocol to teleport an arbitrary unknown N-qubit entangled state from a sender to a fixed receiver under M controllers(M < N) is proposed. The quantum resources required are M non-maximally entangled Greenberger-Home-Zeilinger (GHZ) state and N-M non-maximally entangled Einstein-Podolsky-Rosen (EPR) pairs. The sender performs N generalized Bell-state measurements on the 2N particles. Controllers take M single-particle measurement along x-axis, and the receiver needs to introduce one auxiliary two-level particle to extract quantum information probabilistically with the fidelity unit if controllers cooperate with it.  相似文献   

16.
A continuous-wave (CW) 457 nm blue laser operating at the power of 4.2 W is demonstrated by using a fiber coupled laser diode module pumped Nd: YVO4 and using LBO as the intra-cavity SHG crystal With the optimization of laser cavity and crystal parameters, the laser operates at a very high efficiency. When the pumping power is about 31 W, the output at 457nm reaches 4.2 W, and the optical to optical conversion efficiency is about 13.5% accordingly. The stability of the out putpower is better than 1.2% for 8 h continuously working.  相似文献   

17.
Call for Papers     
正Wireless Body-area Networks The last decade has witnessed the convergence of three giant worlds:electronics,computer science and telecommunications.The next decade should follow this convergence in most of our activities with the generalization of sensor networks.In particular with the progress in medicine,people live longer and the aging of population will push the development of wireless personal networks  相似文献   

18.
正Information Centric Networking Information-Centric Networking(ICN) is an emerging direction in Future Internet architecture research,gaining significant tractions among academia and industry.Aiming to replace the conventional host-to-host communication model by a data-centric model,ICN treats data content as the first  相似文献   

19.
20.
正Journal of Electronics(China)(JE)was founded in 1984,sponsored by the Institute of Electronics,Chinese Academy of Sciences.JE is one of the first English academic journals in China in the field of Electronics and Information technology.The journal was published quarterly since it was launched in 1984 to 2003,then it is published bimonthly till now.During  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号