[1]张弢,任帅,张德刚[].基于可信计算的Ad Hoc网络直接匿名证明[J].计算机技术与发展,2014,24(04):147-150.
 ZHANG Tao[],REN Shuai[],ZHANG De-gang[].Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing[J].,2014,24(04):147-150.
点击复制

基于可信计算的Ad Hoc网络直接匿名证明()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年04期
页码:
147-150
栏目:
安全与防范
出版日期:
2014-04-30

文章信息/Info

Title:
Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing
文章编号:
1673-629X(2014)04-0147-04
作者:
张弢1任帅2张德刚[3]
1.长安大学 电子与控制工程学院;2.长安大学 信息工程学院;3.云南电力试验研究院(集团)有限公司 电力研究院
Author(s):
ZHANG Tao[1]REN Shuai[2]ZHANG De-gang[3]
关键词:
可信计算AdHoc网络直接匿名证明零知识证明
Keywords:
trusted computingAd Hoc networksdirect anonymous attestationzero-knowledge proof
分类号:
TP391
文献标志码:
A
摘要:
现有的Ad Hoc网络完整性认证存在固有的缺陷,且用于传统固定网络的安全认证策略不能适用于Ad Hoc网络完整性认证。因此,文中在研究Ad Hoc网络特点的基础上,将可信计算和直接匿名证明理论引入Ad Hoc网络认证环节中。 Ad Hoc网络安全认证的关键在于对其中各个节点的安全认证,文中在对各个节点认证之前先进行优化。首先在应用硬件层面上建立可信计算平台模块,其次在软件层面上建立直接匿名证明模块,从而实现Ad Hoc网络节点认证环节的优化。实际应用表明,文中提出的方案有效解决了Ad Hoc节点的安全性问题,降低了Ad Hoc网络受攻击的可能性。
Abstract:
The integrity authentication of the existing Ad Hoc networks has inherent defects, and the traditional fixed network security strategy is not appropriate for the integrity authentication of Ad Hoc networks. Therefore,based on the study about the features of Ad Hoc networks,introduce trusted computing and direct anonymous attestation theory into authentication of Ad Hoc networks. The crux of the security authentication for Ad Hoc networks is the security authentication for every node. Optimize the nodes before the authentication. Firstly,constitute trusted computing module on hardware level,and direct anonymous attestation module on software level. The application shows that this scheme can effectively solve security issues of the Ad Hoc nodes,thus declining the attacked possibility of the Ad Hoc net-works.

相似文献/References:

[1]沈武 王天芹 杨帅.基于门限完全分布式密钥管理方案[J].计算机技术与发展,2010,(02):175.
 SHEN Wu,WANG Tian-qin,YANG Shuai.Fully- Distributed Key Management Scheme Based on Threshold[J].,2010,(04):175.
[2]邵星 王汝传 徐小龙.一种基于Agent的Ad hoc网络路由算法[J].计算机技术与发展,2010,(04):21.
 SHAO Xing,WANG Ru-chuan,XU Xiao-long.A Kind of Agent- Based Network Routing Algorithm for Ad hoc Networks[J].,2010,(04):21.
[3]常莉 吴蒙 王立.Ad hoc网络中能量有效路由协议的性能研究[J].计算机技术与发展,2010,(04):47.
 CHANG Li,WU Meng,WANG Li.Investigating Performance of Energy Efficient Routing Protocols for Ad- hoc Networks[J].,2010,(04):47.
[4]印石林 姚放吾.一种基于Ad hoc网络的拥塞检测方法[J].计算机技术与发展,2010,(06):171.
 YIN Shi-lin,YAO Fang-wu.A Congestion Detecting Method Based on Ad hoc Network[J].,2010,(04):171.
[5]张志平 沈介文 吴小毛[].一种Adhoc方式异构组网支持的终端双模组网模型[J].计算机技术与发展,2009,(07):38.
 ZHANG Zhi-ping,SHEN Jie-wen,WU Xiao-mao.An Ad hoc Dual Mode Networking Model Supported by Heterogeneous Network[J].,2009,(04):38.
[6]张登银 吴品.Adhoc网络路由协议性能仿真分析[J].计算机技术与发展,2009,(07):66.
 ZHANG Deng-yin,WU Pin.Simulation and Analysis of Routing Protocols for Ad hoc Network[J].,2009,(04):66.
[7]何晖 于勇 侯迪 齐勇.一种具有移动特征的ad hoc网络电源感知路由协议[J].计算机技术与发展,2009,(08):11.
 HE Hui,YU Yong,HOU Di,et al.A Mobility Based Battery Aware Routing Protocol for ad hoc Networks[J].,2009,(04):11.
[8]张登银 姬广芹.Ad Hoc网络中基于DSR的节能路由协议研究[J].计算机技术与发展,2009,(08):15.
 ZHANG Deng-yin,JI Guang-qin.Research on DSR- Based Energy Routing Protocols for Ad Hoc Networks[J].,2009,(04):15.
[9]张登银 沈邵帅.Ad Hoc网络路由协议仿真分析[J].计算机技术与发展,2009,(08):23.
 ZHANG Deng-yin,SI-IEN Shao-shuai.Simulation Analysis for Routing Protocols in Ad Hoc Network[J].,2009,(04):23.
[10]孙丽艳.基于激励机制的认知无线电自私行为研究[J].计算机技术与发展,2009,(10):170.
 SUN Li-yan.Study of Cognitive Radio' Selfish Behavior Based on Two- Stage Incentives Mechanism[J].,2009,(04):170.

更新日期/Last Update: 1900-01-01