计算机科学 ›› 2013, Vol. 40 ›› Issue (12): 1-8.

• 综述 •    下一篇

移动自组织网络安全接入技术研究综述

乔震,刘光杰,李季,戴跃伟   

  1. 南京理工大学自动化学院 南京210094;南京理工大学自动化学院 南京210094;南京理工大学自动化学院 南京210094;南京理工大学自动化学院 南京210094
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(61170250,1),江苏省自然科学基金(BK2010484)资助

Survey on Secure Access Technology in Mobile Ad-hoc Network

QIAO Zhen,LIU Guang-jie,LI Ji and DAI Yue-wei   

  • Online:2018-11-16 Published:2018-11-16

摘要: 针对移动Ad hoc网络的特点对其中存在的主要安全威胁进行了分析,给出了MANET中安全接入的概念以及主要的性能要求。在此基础上,对MANET的主要安全接入技术进行了回顾,对各方案的优缺点进行了分析。最后对几类典型的安全接入方案进行了比较,并对未来值得进一步研究的问题进行了展望。

关键词: 移动自组织网络,安全接入,认证,密钥管理,门限密码

Abstract: In this paper,the main security threats were analyzed based on the characteristics of MANET.The concept and the performance demand of the secure access were presented.With that,the major secure access techniques of MANET were reviewed and the merits and demerits of each scheme were analyzed.Finally,the several typical kinds of secure access schemes were compared.And the problems which are worth studying further were forecasted.

Key words: MANET,Secure access,Authentication,Key management,Threshold cryptography

[1] 陈林星,曾曦,曹毅.移动Ad-hoc网络——自组织分组无线网络技术(第二版)[M].北京:电子工业出版社,2012
[2] 于弘毅.无线移动自组织网[M].北京:人民邮电出版社,2005
[3] Jain A,Jain A,Sagar P K.Various Security attacks and trust based security architecture for MANET[J].Global Journal of Computer Science and Technology,2010,10(14):32-36
[4] 易平,蒋嶷川,张世永,等.移动Ad Hoc网络安全综述[J].电子学报,2005,33(5):893-899
[5] Cayirci E,Rong C.无线自组织网络和传感器网络安全[M].北京:机械工业出版社,2011
[6] Bellovin S M,Merritt M.Encrypted key exchange:Password-based protocols secure against dictionary attacks[C]∥Procee-ding of the 1992IEEE Symposium on Research in Security and Privacy.1992:72-84
[7] 祁小波.Ad-hoc网络端到端认证加密协议研究[D].西安:西安电子科技大学,2009:24-25
[8] 赵光胜.混合式Ad Hoc网络中接入认证和安全通信技术研究[D].长沙:国防科技大学,2009:9-13
[9] Kim Y D,Perrig A,Tsudik G.Simple and fault-tolerant key agreement for dynamic collaborative groups[C]∥Pierangela S.Proceedings of the 7th ACM Conference on Computer and Communications Security.New York,NY,USA:ACM Press,2000:235-244
[10] Horng G.An efficient and secure protocol for multi-party key establishment[J].The Computer Journal,2001,4(5):463-470
[11] 隋爱芬,杨义先,钮心忻,等.基于椭圆曲线密码的可认证密钥协商协议的研究[J].北京邮电大学学报,2004,7(3):28-32
[12] 王晓峰,张璟,王尚平,等.基于口令认证的移动Ad-hoc网密钥协商方案[J].软件学报,2006,8:1811-1817
[13] Zhou L,Hass Z J.Securing Ad hoc networks[J].IEEE Networks Special Issue on Network Security,1999,3(6):24-30
[14] 胡荣磊,刘建伟,张其善.Ad Hoc网络保密与认证方案综述[J].计算机工程,2007,3(19):134-137
[15] 熊焰,苗付友,张伟超,等.移动自组网中基于多跳步加密签名函数签名的分布式认证[J].电子学报,2003,1(2):161-165
[16] Sander T,Tschudin C F.Protecting mobile agents against malicious hosts[C]∥Mobile Agents and Security.Lecture Notes in Computer Science,1998,9:44-60
[17] Dey H,Datta R.A Threshold Cryptography Based Authentication Scheme for Mobile Ad hoc Network[J].Advances in networks and communication,2011,2:400-409
[18] Seung Y,Robin K.MOCA:Mobile Certificate authority forwireless Ad hoc networks[C]∥IEEE Proc of 2nd Annual PKI Research Workshop Program.Maryland:Gaithersburg,2003:65-79
[19] Kong J,Zerfos P,et al.Providing robust and uniquitous security support for mobile Ad Hoc networks[C]∥IEEE 9th International Conference on Network Protocols(ICNP’01).California,2001:251-260
[20] Luo H,Kong J,et al.Self-securing Ad Hoc wireless networks[A]∥Proc of the Seventh IEEE Symposium on Computers and Communications (ISCC’02)[C].Italy,2002:567-574
[21] Luo H,Lu S.Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks[R].Dept of Computer Science,UCLA,2000:13-23
[22] 李奕男.Ad-hoc网络门限身份认证方案及入侵检测模型研究[D].长春:吉林大学,2010:63-68
[23] 麻晓园,陈前斌,李云.移动Ad-hoc网络中的密钥管理[J].通信技术,2003,0:121-123,8
[24] Omar M,Challal Y,et al.Reliable and fully distributed trustmodel for mobile ad hoc networks[J].Computers& Security,2009,8:199-214
[25] Hubaux J.Buttyan L,Capkun S.The Quest for Security in Mobile Ad Hoc Networks[C]∥Proc of the 2001ACM International Symposium on Mobile ad hoc networking&computing 2001.Long Beach,CA,USA,2001:146-155
[26] Capkun S,Nuttyan L,Hubaux J P.Self-organized Public-KeyManagement for Mobile ad hoc Networks[J].IEEE Transactions on mobile computing,2003,2(1):52-64
[27] 刘世忠,张宗云,贾小珠.一种Ad-hoc网络自组织密钥管理方案的新节点加入安全算法[J].青岛大学学报:自然科学版,2008,1(4):64-66,8
[28] 董攀,朱培栋.一种新型MANET自组织密钥管理方案[J].计算机工程与科学,2009,1(4):13-17
[29] Rafsanjani M K,Shojaiemehr B.Improvement of Self-organized Public Key Management for MANET[J].Journal of American Science,2012,8(1):197-202
[30] 李景峰.移动自组织网络关键安全问题的研究[D].郑州:信息工程大学,2006:19
[31] Khalili A,Katz J.Toward secure key distribution in truly AdHoc networks [A]∥Proceedings of the Symposium on Applications and the Internet Workshops (SAINT’03)[C].Orlando,FL,USA,2003:342-346
[32] Boneh D,Frankkin M K.Identity-based encryption from theWeil pairing[J].SIAM Journal of Computing,2003,2(3):586-615
[33] Deng H,Mukherjee A,Agrawal D P.Threshold and identity- based key management and authentication for wireless ad hoc networks[A]∥Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC’04)[C].Las Vegas,USA,2004:107-110
[34] 李慧贤,庞辽军,王育民.适合ad hoc网络无需安全信道的密钥管理方案[J].通信学报,2010,31(1):112-117
[35] Zhang T,Yue K,Yao J K.A Distributed Anonymous Authentication Scheme for Mobile Ad Hoc Network from Bilinear Maps[A]∥International Conference on Mechatronic Science,Electric Engineering and Computer[C].Jilin,China,2011:314-318
[36] Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]∥Laih CS,ed.Proc.of the ASIACRYPT 2003.LNCS 2894,Berlin:Springer-Verlag,2003:452-473
[37] Zhang F T,Sun Y X,Zhang L,et al.Research on certificateless public key cryptography[J].Journal of Software,2011,2(6):1316-1332
[38] Mandt T K,Tan C H.Certificateless authenticated two-partykeyagreement protocols[C]∥Advances in Computer Science-ASIAN 2006,Secure Software and Related Issues.Heidelberg:Springer-Verlag,2008:37-44
[39] Wang S B,Cao Z F,Wang L C.Efficient certificateless authenticated key agreement protocol from pairings[J].Wuhan University Journal of Natural Sciences,2006,1(5):1278-1282
[40] Swanson C M.Security in key agreement:Two-party certificateless schemes[D].Waterloo:University of Waterloo,2008
[41] Lippold G,Boyd C,Nieto J G.Strongly secure certificateless key agreement[C]∥Proceedings of the Pairing 2009.Lecture Notes In Computer Science,2009(5671):206-230
[42] 葛爱军,陈少真.具有强安全性的不含双线性对的无证书签名方案[J].电子与信息学报,2010,32(7):1765-1769
[43] Baek J,Safavi-Naini R,Susilo W.Certificateless public key encryption without pairing[C]∥ISC 2005.LNCS 3650,Berlin:Springer-Verlag,2005:134-148
[44] Sun Y X,Zhang F T,Baek J.Strongly secure certificateless public key encryption without pairing[C]∥CANS 2007.LNCS 4856,Berlin:Springer-Verlag,2007:194-208
[45] Samreen A,Ansari S.Certificateless ID-based Authentication using Threshold signature for P2P MANETs[A]∥2009Information and Communication Technologies[C].ICICT,2009:112-116
[46] 张彬连.基于簇结构的分布式认证和密钥管理机制研究[D].长沙:湖南师范大学,2007:16-18
[47] Venkatraman L,Agrawal P D.A novel authentication schemefor Ad Hoc Networks[J].IEEE Wireless Com-munications and Networking Conference,2000,3:1268-1273
[48] Bechler M,Hof H J,Kraft D,et al.A cluster-based security architecture for Ad Hoc Networks[C]∥Proc of the 23rd IEEE INFOCOM’04.Hong Kong,China,2004,4:2393-2403
[49] Li G S,Han W B.Cluster-Based key management in Ad HocNetworks[J].Computer Science,2006,33(2):79-82
[50] 李涛.移动Ad-hoc网络的安全性及密钥管理研究[D].济南:山东大学,2007:41-56
[51] Boyen X.Multipurpose Identity-Based Signeryption:A SwissArmy Knife for Identity-Based Cryptography[C]∥Crypto’03,Lecture Notes in Computer Science 2729.Berlin:Springer-Verlag,2003:383-399
[52] 吴旭光,张敏情,杨晓元,等.一种无证书的移动Ad hoc网络密钥管理方案[J].计算机工程与应用,2009,5(21):74-76
[53] Lee D G,Kang S I,Seo D H,et al.Authentication for single/multi domain in ubiquitous computing using attribute certification[A]∥International Conference on Computational Science and Its Applications[C].UK,2006:326-335
[54] 王俊,张红旗,张斌.新的基于角色的跨信任域授权管理模型[J].计算机工程与应用,2010,6(8):106-109
[55] 樊蕊.跨域身份认证系统的研究与实现[D].西安:西安电子科技大学,2007:27-36
[56] 姜奇,马建峰,李光松,等.基于身份的异构无线网络匿名漫游协议[J].通信学报,2010,1(10):138-145
[57] Yao L,Wang L,Kong X W,et al.An inter-domain authentication scheme for pervasive computing environment [J].Compu-ters and Mathematics with Applications,2010,9(2):811-821
[58] 彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,9(8):1271-1281
[59] Chan Y Y,Fleissner S,et al.Single sign-on and key establishment for ubiquitous smart environments[A]∥International Conference on Computational Science and Its Applications[C].Glasgow,UK,2006:406-415
[60] Forne J,Hinarejos F,MarinA A,et al.Pervasive authentication and authorization infrastructures for mobile users[J].Computers&Secutity,2010,9(4):501-514
[61] 罗长远,霍士伟,邢洪智.普适环境中基于身份的跨域认证方案[J].通信学报,2011,2(9):111-115,2

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!