计算机科学 ›› 2013, Vol. 40 ›› Issue (12): 1-8.
• 综述 • 下一篇
乔震,刘光杰,李季,戴跃伟
QIAO Zhen,LIU Guang-jie,LI Ji and DAI Yue-wei
摘要: 针对移动Ad hoc网络的特点对其中存在的主要安全威胁进行了分析,给出了MANET中安全接入的概念以及主要的性能要求。在此基础上,对MANET的主要安全接入技术进行了回顾,对各方案的优缺点进行了分析。最后对几类典型的安全接入方案进行了比较,并对未来值得进一步研究的问题进行了展望。
[1] 陈林星,曾曦,曹毅.移动Ad-hoc网络——自组织分组无线网络技术(第二版)[M].北京:电子工业出版社,2012 [2] 于弘毅.无线移动自组织网[M].北京:人民邮电出版社,2005 [3] Jain A,Jain A,Sagar P K.Various Security attacks and trust based security architecture for MANET[J].Global Journal of Computer Science and Technology,2010,10(14):32-36 [4] 易平,蒋嶷川,张世永,等.移动Ad Hoc网络安全综述[J].电子学报,2005,33(5):893-899 [5] Cayirci E,Rong C.无线自组织网络和传感器网络安全[M].北京:机械工业出版社,2011 [6] Bellovin S M,Merritt M.Encrypted key exchange:Password-based protocols secure against dictionary attacks[C]∥Procee-ding of the 1992IEEE Symposium on Research in Security and Privacy.1992:72-84 [7] 祁小波.Ad-hoc网络端到端认证加密协议研究[D].西安:西安电子科技大学,2009:24-25 [8] 赵光胜.混合式Ad Hoc网络中接入认证和安全通信技术研究[D].长沙:国防科技大学,2009:9-13 [9] Kim Y D,Perrig A,Tsudik G.Simple and fault-tolerant key agreement for dynamic collaborative groups[C]∥Pierangela S.Proceedings of the 7th ACM Conference on Computer and Communications Security.New York,NY,USA:ACM Press,2000:235-244 [10] Horng G.An efficient and secure protocol for multi-party key establishment[J].The Computer Journal,2001,4(5):463-470 [11] 隋爱芬,杨义先,钮心忻,等.基于椭圆曲线密码的可认证密钥协商协议的研究[J].北京邮电大学学报,2004,7(3):28-32 [12] 王晓峰,张璟,王尚平,等.基于口令认证的移动Ad-hoc网密钥协商方案[J].软件学报,2006,8:1811-1817 [13] Zhou L,Hass Z J.Securing Ad hoc networks[J].IEEE Networks Special Issue on Network Security,1999,3(6):24-30 [14] 胡荣磊,刘建伟,张其善.Ad Hoc网络保密与认证方案综述[J].计算机工程,2007,3(19):134-137 [15] 熊焰,苗付友,张伟超,等.移动自组网中基于多跳步加密签名函数签名的分布式认证[J].电子学报,2003,1(2):161-165 [16] Sander T,Tschudin C F.Protecting mobile agents against malicious hosts[C]∥Mobile Agents and Security.Lecture Notes in Computer Science,1998,9:44-60 [17] Dey H,Datta R.A Threshold Cryptography Based Authentication Scheme for Mobile Ad hoc Network[J].Advances in networks and communication,2011,2:400-409 [18] Seung Y,Robin K.MOCA:Mobile Certificate authority forwireless Ad hoc networks[C]∥IEEE Proc of 2nd Annual PKI Research Workshop Program.Maryland:Gaithersburg,2003:65-79 [19] Kong J,Zerfos P,et al.Providing robust and uniquitous security support for mobile Ad Hoc networks[C]∥IEEE 9th International Conference on Network Protocols(ICNP’01).California,2001:251-260 [20] Luo H,Kong J,et al.Self-securing Ad Hoc wireless networks[A]∥Proc of the Seventh IEEE Symposium on Computers and Communications (ISCC’02)[C].Italy,2002:567-574 [21] Luo H,Lu S.Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks[R].Dept of Computer Science,UCLA,2000:13-23 [22] 李奕男.Ad-hoc网络门限身份认证方案及入侵检测模型研究[D].长春:吉林大学,2010:63-68 [23] 麻晓园,陈前斌,李云.移动Ad-hoc网络中的密钥管理[J].通信技术,2003,0:121-123,8 [24] Omar M,Challal Y,et al.Reliable and fully distributed trustmodel for mobile ad hoc networks[J].Computers& Security,2009,8:199-214 [25] Hubaux J.Buttyan L,Capkun S.The Quest for Security in Mobile Ad Hoc Networks[C]∥Proc of the 2001ACM International Symposium on Mobile ad hoc networking&computing 2001.Long Beach,CA,USA,2001:146-155 [26] Capkun S,Nuttyan L,Hubaux J P.Self-organized Public-KeyManagement for Mobile ad hoc Networks[J].IEEE Transactions on mobile computing,2003,2(1):52-64 [27] 刘世忠,张宗云,贾小珠.一种Ad-hoc网络自组织密钥管理方案的新节点加入安全算法[J].青岛大学学报:自然科学版,2008,1(4):64-66,8 [28] 董攀,朱培栋.一种新型MANET自组织密钥管理方案[J].计算机工程与科学,2009,1(4):13-17 [29] Rafsanjani M K,Shojaiemehr B.Improvement of Self-organized Public Key Management for MANET[J].Journal of American Science,2012,8(1):197-202 [30] 李景峰.移动自组织网络关键安全问题的研究[D].郑州:信息工程大学,2006:19 [31] Khalili A,Katz J.Toward secure key distribution in truly AdHoc networks [A]∥Proceedings of the Symposium on Applications and the Internet Workshops (SAINT’03)[C].Orlando,FL,USA,2003:342-346 [32] Boneh D,Frankkin M K.Identity-based encryption from theWeil pairing[J].SIAM Journal of Computing,2003,2(3):586-615 [33] Deng H,Mukherjee A,Agrawal D P.Threshold and identity- based key management and authentication for wireless ad hoc networks[A]∥Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC’04)[C].Las Vegas,USA,2004:107-110 [34] 李慧贤,庞辽军,王育民.适合ad hoc网络无需安全信道的密钥管理方案[J].通信学报,2010,31(1):112-117 [35] Zhang T,Yue K,Yao J K.A Distributed Anonymous Authentication Scheme for Mobile Ad Hoc Network from Bilinear Maps[A]∥International Conference on Mechatronic Science,Electric Engineering and Computer[C].Jilin,China,2011:314-318 [36] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Laih CS,ed.Proc.of the ASIACRYPT 2003.LNCS 2894,Berlin:Springer-Verlag,2003:452-473 [37] Zhang F T,Sun Y X,Zhang L,et al.Research on certificateless public key cryptography[J].Journal of Software,2011,2(6):1316-1332 [38] Mandt T K,Tan C H.Certificateless authenticated two-partykeyagreement protocols[C]∥Advances in Computer Science-ASIAN 2006,Secure Software and Related Issues.Heidelberg:Springer-Verlag,2008:37-44 [39] Wang S B,Cao Z F,Wang L C.Efficient certificateless authenticated key agreement protocol from pairings[J].Wuhan University Journal of Natural Sciences,2006,1(5):1278-1282 [40] Swanson C M.Security in key agreement:Two-party certificateless schemes[D].Waterloo:University of Waterloo,2008 [41] Lippold G,Boyd C,Nieto J G.Strongly secure certificateless key agreement[C]∥Proceedings of the Pairing 2009.Lecture Notes In Computer Science,2009(5671):206-230 [42] 葛爱军,陈少真.具有强安全性的不含双线性对的无证书签名方案[J].电子与信息学报,2010,32(7):1765-1769 [43] Baek J,Safavi-Naini R,Susilo W.Certificateless public key encryption without pairing[C]∥ISC 2005.LNCS 3650,Berlin:Springer-Verlag,2005:134-148 [44] Sun Y X,Zhang F T,Baek J.Strongly secure certificateless public key encryption without pairing[C]∥CANS 2007.LNCS 4856,Berlin:Springer-Verlag,2007:194-208 [45] Samreen A,Ansari S.Certificateless ID-based Authentication using Threshold signature for P2P MANETs[A]∥2009Information and Communication Technologies[C].ICICT,2009:112-116 [46] 张彬连.基于簇结构的分布式认证和密钥管理机制研究[D].长沙:湖南师范大学,2007:16-18 [47] Venkatraman L,Agrawal P D.A novel authentication schemefor Ad Hoc Networks[J].IEEE Wireless Com-munications and Networking Conference,2000,3:1268-1273 [48] Bechler M,Hof H J,Kraft D,et al.A cluster-based security architecture for Ad Hoc Networks[C]∥Proc of the 23rd IEEE INFOCOM’04.Hong Kong,China,2004,4:2393-2403 [49] Li G S,Han W B.Cluster-Based key management in Ad HocNetworks[J].Computer Science,2006,33(2):79-82 [50] 李涛.移动Ad-hoc网络的安全性及密钥管理研究[D].济南:山东大学,2007:41-56 [51] Boyen X.Multipurpose Identity-Based Signeryption:A SwissArmy Knife for Identity-Based Cryptography[C]∥Crypto’03,Lecture Notes in Computer Science 2729.Berlin:Springer-Verlag,2003:383-399 [52] 吴旭光,张敏情,杨晓元,等.一种无证书的移动Ad hoc网络密钥管理方案[J].计算机工程与应用,2009,5(21):74-76 [53] Lee D G,Kang S I,Seo D H,et al.Authentication for single/multi domain in ubiquitous computing using attribute certification[A]∥International Conference on Computational Science and Its Applications[C].UK,2006:326-335 [54] 王俊,张红旗,张斌.新的基于角色的跨信任域授权管理模型[J].计算机工程与应用,2010,6(8):106-109 [55] 樊蕊.跨域身份认证系统的研究与实现[D].西安:西安电子科技大学,2007:27-36 [56] 姜奇,马建峰,李光松,等.基于身份的异构无线网络匿名漫游协议[J].通信学报,2010,1(10):138-145 [57] Yao L,Wang L,Kong X W,et al.An inter-domain authentication scheme for pervasive computing environment [J].Compu-ters and Mathematics with Applications,2010,9(2):811-821 [58] 彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,9(8):1271-1281 [59] Chan Y Y,Fleissner S,et al.Single sign-on and key establishment for ubiquitous smart environments[A]∥International Conference on Computational Science and Its Applications[C].Glasgow,UK,2006:406-415 [60] Forne J,Hinarejos F,MarinA A,et al.Pervasive authentication and authorization infrastructures for mobile users[J].Computers&Secutity,2010,9(4):501-514 [61] 罗长远,霍士伟,邢洪智.普适环境中基于身份的跨域认证方案[J].通信学报,2011,2(9):111-115,2 |
No related articles found! |
|