期刊文献+

基于改进的MAC和μTESLA的MANET安全路由算法 被引量:3

A secure routing protocol for mobile ad hoc network based on MAC and μTESLA
在线阅读 下载PDF
导出
摘要 针对现有移动自组网安全路由协议难以兼顾数据完整性和机密性的问题,提出了一种结合数据完整性保护和数据机密性保护的安全路由协议。在数据完整性保护方面,采用单向hash函数和密钥生成消息认证码,鉴别路由中数据的完整性;在数据机密性保护方面,采用μTESLA协议传输加密数据包,在不同的时段传输不同的密钥,通过对称密钥的延迟透露模拟非对称机制,降低认证广播的资源消耗。仿真实验表明,该方法不仅在安全性方面优于现有的路由协议,而且在报文送达率、路由开销和端到端平均时延评价指标上也优于现有路由协议。 For solving the problem that traditional routing protocols for mobile ad hoc network does not give consideration to data ′ s completeness and confidentiality, a secure routing protocol is proposed by combining data ′ s completeness protection with confidentiality protection. On the aspect of protecting data ′ s completeness, one way hash function and key are used to generate MAC, which is used to authenticate data ′ s completeness. On the aspect of protecting data ′ s confidentiality, μTESLA protocol is used to transmit cryptographic packets, deliver different key with different time interval, and execute a delayed disclosure of symmetric keys to simu-late asymmetric mechanism, for reducing the resource consumption of authenticated broadcast. Simulation shows that the new method wins out over traditional routing protocols not only on the aspect of security, but also on the evaluating indicators including packer delivery ratio, routing overhead and end-to-end mean latency.
作者 杨官霞 周頔 张展 Yang Guanxia;Zhou Di;Zhang Zhan(Department of Computer and Information Technology,Zhejiang Changzheng Vocational & Technical College,Hangzhou 310023,China;Sichuan University of Arts and Science,Dazhou 635000,China;School of Electrical Engineering and Automation,Henan Polytechnic University,Jiaozuo 454000,China)
出处 《电子技术应用》 2018年第6期94-98,共5页 Application of Electronic Technique
基金 浙江自然科学基金项目(LY16A010020)
关键词 移动自组网 路由协议 消息认证码 密钥 单向函数 认证广播 mobile ad hoc network routing protocol MAC key one way function authenticated broadcast
  • 相关文献

参考文献2

二级参考文献18

  • 1熊焰,张伟超,苗付友,王行甫.一种基于计算能力的无需可信第三方公平非抵赖信息交换协议[J].电子学报,2006,34(3):563-566. 被引量:4
  • 2[1]V Varadharajan,R Shankaran,M Hitchens.Security for cluster based ad hoc networks.Computer Communications,2004,27(5):488-501
  • 3[2]Marc Bechler,Hans-Joachim Hof,Daniel Kraft,et al.A cluster-based security architecture for ad hoc networks.The IEEE INFOCOM,Hong Kong,2004
  • 4[3]L Zhou,Z J Haas.Securing ad hoc networks.IEEE Network,1999,13(6):24-30
  • 5[4]H Y Lin,Y M Huang.Cluster-based key management for mobile ad hoc Networks.The 10th Mobile Computing Workshop,Taichung,Taiwan,China,2004
  • 6[5]Xiao-Hui Kuang.Research of group key management in mobile ad hoc networks:[Ph D dissertation].Changsha:National University of Defense Technology,2003
  • 7[6]The network simulator-ns-2.http://www.isi.edu/nsnam/ns/,2002
  • 8[7]T Camp,J Boleng,V Davies.A survey of mobility models for ad hoc network research.Wireless Communications and Mobile Computing (WCMC):Special issue on Mobile Ad Hoc Networking:Research,Trends and Applications,2002,2(5):483-502
  • 9赵波,严飞,余发江.可信计算[M].北京:机械工业出版社,2009.
  • 10T Tedrick. Fair exchange of secrets [ A ]. Proceedings of CRYtrlO 84, Lecture notes in Computer Science [ C ]. Ger- many: Springer Verlag, 1985.196:434 - 438.

共引文献2

同被引文献32

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部