基于身份密码的机载自组织网络动态密钥管理
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Identity Based Dynamic Key Management of Airborne Ad Hoc Network
  • 作者:王宏 ; 李建华 ; 赖成喆
  • 英文作者:WANG Hong;LI Jianhua;LAI Chengzhe;Information and Navigation College, Air Force Engineering University;Information and Communication College, National University of Defense Technology;Xi'an University of Posts & Telecommunications;
  • 关键词:机载网络 ; 身份密码体制 ; 密钥管理 ; 自组织 ; 分布式
  • 英文关键词:Airborne network;;Identity-based cryptography;;Key management;;Self-organized;;Distributed
  • 中文刊名:DZYX
  • 英文刊名:Journal of Electronics & Information Technology
  • 机构:空军工程大学信息与导航学院;国防科技大学信息通信学院;西安邮电大学;
  • 出版日期:2018-06-07 09:05
  • 出版单位:电子与信息学报
  • 年:2018
  • 期:v.40
  • 基金:国家自然科学基金(61401499,61502386)~~
  • 语种:中文;
  • 页:DZYX201808029
  • 页数:7
  • CN:08
  • ISSN:11-4494/TN
  • 分类号:212-218
摘要
针对现有机载自组织网络密钥管理存在的预分配密钥更新困难、公钥证书传递开销大、分布式身份密钥传递需要安全信道的问题,该文提出一种无需安全信道的基于身份密码体制的动态密钥管理方案。该方案包括系统密钥自组织生成和用户私钥分布式管理两个算法;采取遮蔽密钥的办法,确保私钥在公共信道中全程安全传递,使得密钥管理易于部署、方便扩展;最后分析了方案的正确性与安全性。结果证明方案理论正确,能够抵抗假冒、重放、中间人攻击。
        Because of nowadays airborne network's updating difficulty of pre-allocated symmetrical key, high communication cost of public key certificate and the requirement of security channel for distributed identitybased key management, identity-based dynamic key management of airborne network is proposed. It is composed of two algorithms: self-organized generation of master key without the trusted third party and distributed management of user's private key. Moreover, the master key share and user private partition can be delivered without the pre-established security channel by blinding them so that the scheme is easy to develop and flexible to extend. Finally, the correctness and security of the proposed scheme are proved, it is shown that it can provide the ability to resist the impersonation attack, replay attack and man-in-the-middle attack.
引文
[1]李杰,宫二玲,孙志强,等.下一代机载网络技术评述[J].指挥与控制学报,2015,1(3):351-356.doi:JCC.CN.2015.00351.LI Jie,GONG Erling,SUN Zhiqiang,et al.An overview of next generation airborne networks[J].Journal of Command and Control,2015,1(3):351-356.doi:JCC.CN.2015.00351.
    [2]梁一鑫,程光,郭晓军,等.机载网络体系结构及其协议栈研究进展[J].软件学报,2016,27(1):96-111.doi:10.13328/j.cnki.jos.004925.LIANG Yixin,CHENG Guang,GUO Xiaojun,et al.Research progress on architecture and protocol stack of the airborne network[J].Journal of Software,2016,27(1):96-111.doi:10.13328/j.cnki.jos.004925.
    [3]SHANTHI K and MURUGAN D.Pair-wise key agreement and hop-by-hop authentication protocol for MANET[J].Wireless Networks,2016,23(4):1-9.doi:10.1007/s11276-015-1191-x.
    [4]PHUNG P H and MINH Q T.DASSR:A distributed authentication scheme for secure routing in wireless ad-hoc networks[C].International Conference on Future Data and Security Engineering.Can Tho,Vietnam,2016:219-236.doi:10.1007/978-3-319-48057-216.
    [5]DONG Ying,SUI Aifeng,YIU S M,et al.Providing distributed certificate authority service in cluster-based mobile ad hoc networks[J].Computer Communications,2007,30(11/12):2442-2452.doi:10.1016/j.comcom.2007.04.011.
    [6]韩磊,刘吉强,赵佳,等.移动ad hoc网络分布式轻量级CA密钥管理方案[J].四川大学学报(工程科学版),2011,43(6):133-139.doi:10.15961/j.jsuese.2011.06.021.HAN Lei,LIU Jiqiang,ZHAO Jia,et al.Distributed lite CAkey management scheme in mobile ad hoc networks[J].Journal of Sichuan University(Engineering Science Edition),2011,43(6):133-139.doi:10.15961/j.jsuese.2011.06.021.
    [7]DATKO B.Supporting secure,ad hoc joins for tactical networks[R].Maryland:United States Naval Academy Trident Scholar Project Report,2002.
    [8]CAPKUN S,NUTTYAN L,and HUBAUX J P.Selforganized public-key management for mobile ad hoc networks[J].IEEE Transactions on Mobile Computing,2003,2(1):52-64.doi:10.1109/TMC.2003.1195151.
    [9]RAFSANJANI M K and SHOJAIEMEHR B.Improvement of self-organized public key management for MANET[J].Journal of American Science,2012,8(1):197-202.
    [10]JANANI V S and MANIKANDAN M S K.Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks[R].Sadhana,2016.doi:10.1007/s12046-016-0545-0.
    [11]OMAR M,BOUFAGHES H,MAMMERI L,et al.Secure and reliable certificate chains recovery protocol for mobile ad hoc networks[J].Journal of Network&Computer Applications,2016,62(C):153-162.doi:10.1016/j.jnca.2016.01.007.
    [12]SHAMIR.Identity-based cryptosystems and signature schemes[J].LNCS,1984,21(2):47-53.doi:10.1007/3-540-39568-75.
    [13]BONEH D and FRANKLIN M.Identity-based encryption from the weil pairing[C].International Cryptology Conference on Advances in Cryptology.Santa Barbara,USA,2001:213-229.doi:10.1007/3-540-44647-8_13.
    [14]曹丹,王小峰,王飞,等.SA-IBE:一种安全可追责的基于身份加密方案[J].电子与信息学报,2011,33(12):2922-2928.doi:10.3724/SP.J.1146.2011.00399.CAO Dan,WANG Xiaofeng,WANG Fei,et al.SA-IBE:Asecure and accountable identity-based encryption scheme[J].Journal of Electronics&Information Technology,2011,33(12):2922-2928.doi:10.3724/SP.J.1146.2011.00399.
    [15]ZHANG Tao,YUE Kang,and YAN Jinkui.A distributed anonymous authentication scheme for mobile ad hoc network from bilinear maps[C].International Conference on Mechatronic Science,Electric Engineering and Computer.Jilin,China,2011:314-318.doi:10.1109/mec.2011.6025464.
    [16]NARAYANA V L and BHARATHI C R.Identity based cryptography for mobile ad hoc networks[J].Journal of Theoretical and Applied Information Technology,2017,95(5):1173-1182.
    [17]罗长远,李伟,邢洪智,等.空间网络中基于身份的分布式密钥管理研究[J].电子与信息学报,2010,32(1):183-188.doi:10.3724/SP.J.1146.2009.00461.LUO Changyuan,LI Wei,XING Hongzhi,et al.Research on identity-based distributed key management in space network[J].Journal of Electronics&Information Technology,2010,32(1):183-188.doi:10.3724/SP.J.1146.2009.00461.
    [18]XIA Pengrui,WU Meng,WANG Kun,et al.Identity-based fully distributed certificate authority in an OLSRMANET[C].International Conference on Wireless Communications,Networking and Mobile Computing.Dalian,China,2008:1-4.doi:10.1109/wicom.2008.614.
    [19]任艳丽,蔡建兴,黄春水,等.基于身份加密中可验证的私钥生成外包算法[J].通信学报,2015,36(11):61-66.doi:10.11959/j.issn.1000-436x.2015233.REN Yanli,CAI Jianxing,HUANG Chunshui,et al.Verifiable outsourcing private key generation algorithm in an identity-based encryption scheme[J].Journal of Communications,2015,36(11):61-66.doi:10.11959/j.issn.1000-436x.2015233.
    [20]李慧贤,庞辽军,王育民.适合ad hoc网络无需安全信道的密钥管理方案[J].通信学报,2010,31(1):112-117.LI Huixian,PANG Liaojun,and WANG Yumin.Key management scheme without secure channel for ad hoc networks[J].Journal of Communications,2010,31(1):112-117.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700