通信学报 ›› 2012, Vol. 33 ›› Issue (12): 93-99.doi: 10.3969/j.issn.1000-436x.2012.12.012

• 学术论文 • 上一篇    下一篇

机会网络中基于社会属性的按需密钥管理方案

陈曦1,2,李光松3,田有亮1,马建峰1   

  1. 1 西安电子科技大学 计算机网络与信息安全教育部重点实验室,陕西 西安 710071
    2 中国电子科技集团公司第二十研究所,陕西 西安 710068
    3 解放军信息工程大学 信息工程学院,河南 郑州 450002
  • 出版日期:2012-12-25 发布日期:2017-07-15
  • 基金资助:
    长江学者和创新团队发展计划基金资助项目;国家自然基金委员会——广东联合基金重点基金资助项目;国家科技部重大专项基金资助项目;中央高校基本科研业务费基金资助项目

On-demand key management based on social attribute for opportunistic networks

Xi CHEN1,2,Guang-song LI3,You-liang TIAN1,Jian-feng MA1   

  1. 1 Key Laboratory of Computer Networks and Informatio urity(Ministry of Education),Xidian University,Xi’an 710071,China
    2 The Twentieth Research Institute of China Electronics Technology Group Corporation,Xi’an 710068,China
    3 Department of Information Research,PLA Information Engineering University,Zhengzhou 450002,China
  • Online:2012-12-25 Published:2017-07-15
  • Supported by:
    The Program for Changjiang Scholars and Innovative Research Team in University;The Key Program of NSFC-Guangdong Union Foundation;The Major National S&T Program;The Fundamental Research Funds for the Central Universities

摘要:

摘 要:针对机会网络的间歇性连通、快速移动、自组织管理等特征,提出了基于社会属性的按需密钥管理方案。首先利用基于身份的门限签名方案,实现了节点社会属性的自认证。随后结合机会网络的路由特性,节点之间根据社会属性匹配度有选择地颁发身份证书,并建立可度量的信任网。算法在优化证书图的同时,避免了恶意节点可能导致的无效证书链路的生成。实验仿真表明,该方案可提供较高的证书链重构成功率与节点认证可达率,并有效地降低了密钥管理所需的网络开销。

关键词: 机会网络, 密钥管理, 身份密码学, 门限密码学, 社会属性, 证书图

Abstract:

An on-demand key management scheme was proposed based on social attributes,which could conform to the characteristics of intermittent connectivity,high mobility and self-organized management in opportunistic networks.By utilizing the identity-based threshold signature scheme,the authentication of nodes’social attributes was realized.Due to the specialty of the opportunistic routing protocols,nodes selectiv ly issued the identity certificates for each other to establish the Web of trust based on the matching of social attributes.Consequently,the performance of certificate graph was efficiently optimized comparing to the traditional met .Meanwhile,thanks to checking the social attribute evidences,the invalid certificate chains caused by malicious nodes were avoid to be built.Simulation result shows that,the scheme can provide high success ratio for reconstruction of certificate chains and high user reachability through low network costs in opportunistic networks.

Key words: opportunistic networks, key management, identity-based cryptography, threshold cryptography, social attribute, certificate graph

No Suggested Reading articles found!