期刊文献+

移动Ad Hoc网络的安全路由协议研究 被引量:4

Research on Secure Routing Protocolfor Mobile Ad Hoc Networks
原文传递
导出
摘要 ad hoc网络是一种新型的无线移动网络,因其独特的组网特性,使得安全问题成为其发展的最大束缚。路由协议的安全是自组网安全的一个重要部分。本文首先论述移动AdHoc网络中的安全问题,介绍了多种安全路由的协议和方案,并对其中的三种按需安全路由协议进行了比较,最后提出进一步研究AdHoc网络路由安全应注意的问题。 Ad hoc networks is a new kind of wireless mobile network, and due to its special networking features, the security has becomea serious shackle for the development of the Ad Hoc network. The security of the route protocol is animportant part of the self-organized network security, Thispaper first describes the security in the mobile Ad Hoc network, then introduces various secure route protocols and solutions, among which the three on-demand secure route protocols are compared, and finally proposes some suggestions to which attention should be paid in the further research of the Ad Hoc network.
出处 《信息安全与通信保密》 2007年第8期182-184,共3页 Information Security and Communications Privacy
关键词 AD HOC网络 无线移动网络 安全路由协议 Ad Hoc networks wireless mobile networks: secure route protocol
  • 相关文献

参考文献5

  • 1[1]Hu Y,Perrig A,Johnson D.Ariadne.A secure on-Demand routing protocol for wireless Ad Hoc networks[C].Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (MobiCom 2002),September 2002.
  • 2[2]Sanzgiri K,Dahill B.A secure routing protocol for Ad Hoc networks[C].In:Proc of 2002 IEEE International Conference on Network Protocols (ICNP) November 2002.
  • 3[3]Papadimitratos P,Haas Z J.Secure routing for mobile Ad Hoc networks[C].SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002),San Antonio,TX,January 2002.
  • 4甄海潮,周海刚.Ad Hoc网络的安全问题和安全策略[J].军事通信技术,2001,22(4):25-28. 被引量:7
  • 5[5]王英龙,牛秋娜,王美琴.移动Ad Hoc网络的安全路由协议研究[C].DPCS2003&NDCS13论文集,2003.252~259.

二级参考文献4

  • 1StajanoF,,AndersonR.The resurrecting duckling:security issues for ad- hoc wireless networks[A ][].Proceedings ofthInternationalWorkshop onSecurityProtocols.1999
  • 2Diffie W,Hellman M.New directions in cryptography[].IEEE Transactions on Information Theory.1976
  • 3Steiner M,Tsudik G,Waidner M.Diffie-Hellman "Key distribution extended to group communication"[C].ACM Conference Computer and Communication Security California:ACM Press.1996
  • 4Zhou L,Haas Z J.Securing ad hoc networks[].IEEE Network.1999

共引文献6

同被引文献18

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部