无线MESH网络环境下的安全行为及保障方法的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线Mesh网络以部署灵活扩展快速的特点,在军事国防、公共安全、环境监测、健康医疗、城市交通、生产生活等诸多领域都显示出广阔的应用前景。在实际应用问题中,往往由于无线媒质的共享性、多跳的通信机制、动态拓扑、缺乏可信赖的控制中心和缺少对Mesh路由器的物理保护等原因,使无线Mesh网络容易受到各种恶意攻击的威胁。对于这样的问题,现有无线网络的安全保障方案不能完全适用,因为无线Mesh组网结构有别于点到多点的Wi-Fi和WiMAX等网络,也有别于多点到多点的无线传感器网络和移动Ad hoc网络。目前针对无线Mesh网络已经提出很多安全协议,但是缺少一种系统的措施来发现、防范和响应恶意攻击的威胁,使这些安全协议对抗恶意攻击的能力非常有限。
     本文以不完全信息动态博弈理论为基础,以密码学为支撑,围绕解决无线Mesh网络环境下节点间通信行为的安全问题,从节点的角度出发,针对博弈环境下的安全行为及保障方法主要从行为的安全可信评估、行为的安全保障和叛逆行为追踪这三个方面进行深入细致的研究,取得以下创新性研究成果。
     (1)提出无线Mesh网络中节点安全行为模型NodeEYE,解决行为的安全可信评估和现有安全模型不能完全满足节点间通信行为的安全和隐私需求问题。节点安全行为模型NodeEYE通过标识可信、行为可信和内容可信(三因素)的评估建立对通信对方节点安全性判定的可信逻辑;将评估结果与资源分配相关联实现资源的优化配置;通过属性、三因素递进评估模型和基于评估和风险的双因素贝叶斯决策模型刻画节点的状态和智能行为,描述节点为保障通信安全而预期采取的行为策略。与现有安全模型相比较,可以分析更为广泛的安全性质,变事后证明逻辑为事先证明逻辑,根据安全需要进行模型演变,使节点以一种主动的姿态应对恶意攻击,为通信协议的安全性分析奠定理论基础。
     (2)提出隐私增强的混合密钥协商方案、基于标识证书预分配的漫游即时认证方案和无线应急Mesh网络中群组准入方案,解决现有协商行为、漫游行为和群组加入行为的安全保障方案资源消耗较多和隐私保护欠缺的问题。
     针对协商行为的安全问题,隐私增强的混合密钥协商方案利用签密保证只有通信对方可以解密并且验证消息;利用对称密钥加密保护共享密钥生成元素;利用哈希函数代替数字签名实现密钥源的认证。与现有密钥协商方案相比较,能够更有效地保护通信双方的隐私,可节省计算资源约12.5%,通信资源约33.3%。
     针对漫游行为的安全问题,基于标识证书预分配的漫游即时认证方案通过引入轻量级标识证书降低公钥证书使用的复杂性;通过在访问网络认证中心、归属网络认证中心和网络接入点预先合理部署标识证书,使合法的移动节点可以从网络认证中心获得漫游通行证,进而实现域内漫游和域间漫游即时认证。与现有漫游认证方案相比较,能够节省访问网络和归属网络之间认证信息的交互,减少认证中心参与漫游认证的次数,节省网络资源,减小漫游认证延迟。
     针对群组加入行为的安全问题,无线应急Mesh网络中群组准入方案利用关联随机数把椭圆曲线ElGamal密码和有向签名相结合增强算法安全性和通信双方的隐私保护;利用椭圆曲线签密和参数复用保证通信的安全和效率。与基于传统椭圆曲线密码技术的群组准入方案相比较,隐私保护进一步增强,可节省计算资源约33.3%,通信资源约25%。
     (3)提出群组通信中动态叛逆者追踪方案iGOSDTT,解决群组通信中叛逆行为的追踪问题。动态叛逆者追踪方案iGOSDTT依据叛逆行为监测中心捕获的叛逆者归属群组信息和叛逆者数目信息锁定叛逆者疑似群组;运用轻量级组签密算法iGOS针对特定用户群组进行组密钥更新,实现对叛逆者疑似群组的持续二分子群划分,逐步缩小叛逆者疑似范围,直至追踪到叛逆者。动态叛逆者追踪
Wireless Mesh Networks (WMNs), with the characteristics of fast extension andflexible deployment, are inspiring broad applications in military defense, public safety,environmental monitoring, healthcare, urban transport, production, living, etc. Inpractice, WMNs are prone to various malicious attacks due to open wireless media,multihop communication mechanism, dynamic topology, lack of a trusted controlcenter, lack of a physical protection of mesh routers, etc. Therefore, it is not practicalfor WMNs to directly apply existing security protection methods used in wirelessnetworks since the wireless mesh connectivity is different from point-to-multipointarchitecture of Wi-Fi, WiMAX, etc. and from multipoint-to-multipoint connectivity ofwireless sensor networks (WSNs) and mobile ad hoc networks (MANETs). Manysecurity protocols proposed for WMNs show a limited power to counter maliciousattacks for lack of a systematic measure for discovery, prevention and response.
     In the dissertation, based on non-complete dynamic game theory, supported bycryptography, from three levels of behavioral trusted security evaluation, behavioralsecurity protection and behavioral traitor tracing and from the perspective of node, wethoroughly studied security behaviors and protection methods in game environment inorder to specially resolve the security problems of communication behaviors betweennodes in WMNs. The major contributions of this dissertation are stated as follows:
     (1) Propose a node security behavior model in WMNs named NodeEYE toresolve the problems of the behavioral trusted security evaluation and that existingsecurity models can not entirely satisfy the requirements on security and privacy ofcommunication behaviors between nodes.
     NodeEYE establishes a trusted logic for judging the security of peer party bymeans of evaluations of trusted identity, trusted behavior and trusted content(three-factor) and optimizes the allocation of resources by associating the results oftrusted security evaluation and resources allocation. Using attributes, progressivethree-factor evaluation model and two-factor Bayes decision-making model based onevaluation and risk, NodeEYE depicts node’s state and intelligent behaviors anddescribes how to adopt the next behavior strategy for protecting communicationsecurity. In comparison to existing security models, the proposed NodeEYE can beused to analyze more extensive security properties, transform a later proven logic to aprior proven logic, evolve according to security requirements, make a node countermalicious attacks in a proactive stance, and provide a stable theory foundation forsecurity analysis of communication protocols.
     (2) Propose privacy-enhanced hybrid key exchange schemes, an identificationcertificate predistribution based roaming instant authentication scheme and group admission schemes in emergency wireless mesh networks to resolve the problems thatexisting security protection methods of agreement behavior, roaming behavior andgroup entry behavior explore resources cost more and privacy protection less.
     To the agreement behavior security, the privacy-enhanced hybrid key exchangeschemes use signcryption to guarantee that only the peer party can decrypt and verifythe message, use symmetric encryption to protect original elements of a shared key,and use hash function to achieve key source authentication instead of digital signature.In comparison to existing key agreement methods, the schemes effectively protectboth parties’ privacy and preserve the resources of computation and communicationup to12.5%and33.3%, respectively.
     To the roaming behavior security, the identification certificate predistributionbased roaming instant authentication scheme descends the complexity of public keycertificate in use through importing a lightweight identification certificate, guaranteesthat any legitimate mobile node gains a roaming passport from an authenticationcenter and then achieves the intra-and inter-domain roaming instant authenticationthrough rationally pre-deploying identification certificates in authentication centers ofvisited and home networks and access points. In comparison to existing roamingauthentication methods, the scheme leaves out the authentication informationexchange between visited and home networks, reduces roaming authenticationnumbers with the participation of authentication centers, in the result, saves networkresources and shortens roaming authentication delay further.
     To the group entry behavior security, the group admission schemes in emergencyWMNs use associated random numbers to combine the elliptic curve ElGamal anddirected signature to enhance the security of algorithm and privacy of both parties anduse the elliptic curve signcryption and parameter reuse to guarantee the security andefficiency of communication. In comparison to traditional elliptic curve based groupadmission methods, the schemes achieve privacy enhanced further and resourcespreservation up to33.3%and25%in terms of computation and communication,respectively.
     (3) Propose a dynamic traitor tracing scheme in group communication namediGOSDTT to resolve the problem of the behavioral traitor tracing.
     The scheme locks suspicious traitor groups according to the information ofbelonging group and traitor’s number captured by a traitor behavior monitoring center,updates the group key to special groups using a lightweight group orientedsigncryption algorithm iGOS, divides the suspicious traitor groups in binary waycontinuously, reduces the suspicious area step by step until trace the traitors. Thescheme resolves the problem of traitor behavior tracing in group communication.
引文
1S BUCKLEY, S O’KEEFE, J BARTHOLD.10hottest technologies. Telecommunications,USA,2004,38(4):20-29
    2S WOOLLEY. Backwater broadband. Forbes, USA, July2005, available at http://www.forbes.com/free_forbes/2005/0704/064.html
    3I F AKYILDIZ, X D WANG, W L WANG. Wireless mesh networks: a survey. ComputerNetworks,2005,47:445-487
    4P WHITEHEAD. Mesh networks: a new architecture for broadband wireless access systems.Proc. IEEE Radio and Wireless Conference, RAWCON2000, Denver, CO, USA, Sep.10-13,2000:43-46
    5G PUJOLLE, H CHAOUCHI, D GAITI. A global architecture for the Wi-family. Tele-communication Systems,2006,31:163-171
    6K R FOSTER. Radiofrequency exposure from wireless LANs utilizing Wi-Fi technology.Health Physics,2007,92(3):280-289
    7I PAPAPANAGIOTOU, D TOUMPAKARIS, J LEE, M DEVETSIKIOTIS. A survey onnext generation mobile WiMAX networks: Objectives, features and technical challenges.IEEE Communications Surveys and Tutorials,2009,11(4):3-18
    8M KAS, B YARGICOGLU, I KORPEOGLU, E KARASAN. A survey on scheduling inIEEE802.16mesh mode. IEEE Communications Surveys and Tutorials,2010,12(2):205-221
    9I F AKYILDIZ, W L SU, Y SANKARASUBRAMANIAM, E CAYIRCI. Wireless sensornetworks: A survey. Computer Networks,2002,38(4):393-422
    10O D INCEL. A survey on multi-channel communication in wireless sensor networks.Computer Networks,2011,55(13):3081-3099
    11S CORSON, J MACKER. Mobile ad hoc networking (MANET): routing protocol perfor-mance issues and evaluation considerations. IETF RFC2501, Jan.1999, available at http://www.ietf.org/rfc/rfc2501.txt
    12M N LIMA, S A L DOS, G PUJOLLE. A survey of survivability of mobile ad hoc networks.IEEE Communications Surveys and Tutorials,2009,11(1):66-77
    13方旭明,马忠建.无线Mesh网络的跨层设计理论与关键技术.西南交通大学学报,2005,40(6):711-719
    14I F AKYILDIZ, X D WANG. A survey on wireless mesh networks. IEEE Radio Communi-cations,2005,43(9): S23-S30
    15K H KIM, K G SHIN. Self-reconfigurable wireless mesh networks. IEEE/ACM Transac-tions on Networking,2011,19(2):393-404
    16J J LIU, X H JIANG, H NISHIYAMA, N KATO. Reliability assessment for wireless meshnetworks under probabilistic region failure model. IEEE Transactions on Vehicular Tech-nology,2011,60(5):2253-2264
    17F S CHU, K C CHEN. Radio resource management of self-organizing OFDMA wirelessmesh networks. Wireless Communications and Mobile Computing,2011,11(3):306-320
    18G R HIERTZ, D DENTENEER, S MAX, R TAORI, J CARDONA, L BERLEMANN, BWALKE. IEEE802.11s: The WLAN mesh standard. IEEE Wireless Communications,2010,17(1):104-111
    19S M FACCIN, C WIJTING, J KNECKT, A DAMLE. Mesh WLAN networks: Concept andsystem design. IEEE Wireless Communications,2006,13(2):10-17
    20E FERRO, F POTORTI. Bluetooth and Wi-Fi wireless protocols: A survey and acomparison. IEEE Wireless Communications,2005,12(1):12-26
    21C SO-IN, R JAIN, A K TAMIMI. Scheduling in IEEE802.16e mobile WiMAX networks:Key issues and a survey. IEEE Journal on Selected Areas in Communications,2009,27(2):156-171
    22S K RAY, K PAWLIKOWSKI, H SIRISENA. Handover in mobile WiMAX networks: Thestate of art and research issues. IEEE Communications Surveys and Tutorials,2010,12(3):376-399
    23I F AKYILDIZ, W L SU, Y SANKARASUBRAMANIAM, E CAYIRCI. A survey on sensornetworks. IEEE Communications Magazine,2002,40(8):102-114
    24C BURATTI, A CONTI, D DARDARI, R VERDONE. An overview on wireless sensornetworks technology and evolution. Sensors,2009,9(9):6869-6896
    25H M AMMARI. A survey of current architectures for connecting wireless mobile ad hocnetworks to the Internet. International Journal of Communication Systems,2007,20(8):943-968
    26C CAILLOUET, S PERENNES, H RIVANO. Framework for optimizing the capacity ofwireless mesh networks. Computer Communications,2011,34(13):1645-1659
    27F NAIT-ABDESSELAM, K C CHEN, E S ELMALLAH, M FRANK. Architectures andprotocols for wireless mesh, ad hoc, and sensor networks. Wireless Communications andMobile Computing,2011,11(3):303-305
    28M R SOURYAL, A WAPF, N MOAYERI. Rapidly-deployable mesh network testbed. Proc.IEEE Global Telecommunications Conference, GLOBECOM09, Honolulu, HI, USA,2009,1-8:5536-5541
    29J ROBINSON, M SINGH, R SWAMINATHAN, E KNIGHTLY. Deploying mesh nodesunder nonuniform propagation. Proc. IEEE INFOCOM2010, San Diego, CA, USA, Mar.15-19,2010
    30T FOWLER. Mesh networks for broadband access. IEE Review,2001,47(1):17-22
    31K RAYNER. Mesh wireless networking. Communications Engineer,2003,1(5):44-47
    32M S CORSON, J MACKER, S G BATSELL. Architectural considerations for mobile meshnetworking. Proc. IEEE Military Communications Conference, MILCOM96, Mclean, VA,USA, Oct.21-24,1996,1-3:225-229
    33D J SHYY. Military usage scenario and IEEE802.11s mesh networking standard. Proc.IEEE Military Communications Conference, MILCOM2006, Washington, DC, USA, Oct.23-25,2006,1-7:133-139
    34M PREUSS, S THOMAS. Wireless, mesh&ad hoc networks military convoy location andsituation awareness. Proc. IEEE Samoff Symposium2008, Princeton, NJ, USA, Apr.28-30,2008:72-76
    35W PAK, Y J CHOI. Topology aggregation for hierarchical wireless tactical networks. KSIITransactions on Internet and Information Systems,2011,5(2):344-358
    36M PORTMANN, A A PIRZADA. Wireless mesh networks for public safety and crisismanagement applications. IEEE Internet Computing,2008,12(1):18-25
    37D ABUSCH-MAGDER, P BOSCH, T E KLEIN, P A POLAKOS, L G SAMUEL, HVISWANATHAN.911-NOW: A network on wheels for emergency response and disasterrecovery operations. Bell Labs Technical Journal,2007,11(4):113-133
    38A YARALI, B AHSANT, S RAHMAN. Wireless mesh networking: A key solution foremergency&rural applications. Proc. MESH:2009International Conference on Advancesin Mesh Networks, Athens, Greece, Jun.18-23,2009:143-149
    39L K BANDYOPADHYAY, S K CHAULYA, P K MISHRA, A CHOURE, B M BAVEJA.Wireless information and safety system for mines. Journal of Scientific&IndustrialResearch,2009,68:107-117
    40G LAPICHINO, C BONNET, O D R HERRERO, C BAUDOIN, I BURET. A mobile ad-hocsatellite and wireless mesh networking approach for public safety communications. Proc.10th International Workshop on Signal Processing for Space Communications, Rhodes,Greece, Oct.06-08,2008:16-21
    41J W TIAN, S R ZHOU, M J GAO. City crisis response system based on mesh wirelessself-organization network. Proc.20th Chinese Control and Decision Conference, Yantai,China, July02-04,2008,1-11:4691-4695
    42M TOLEDANO-AYALA, G HERRERA-RUIZ, G M SOTO-ZARAZUA, E A RIVAS-ARAIZA, R D B TRUJILLO, R E PORRAS-TREJO. Long-range wireless mesh networkfor weather monitoring in unfriendly geographic conditions. Sensors,2011,11(7):7141-7161
    43R JURDAK, A NAFAA, A BARBIRATO. Large scale environmental monitoring throughintegration of sensor and mesh networks. Sensors,2008,8(11):7493-7517
    44S NANDA, D KOTZ. Mesh-Mon: A multi-radio mesh monitoring and management system.Computer Communications,2008,31(8):1588-1601
    45S A O’SHAUGHNESSY, S R EVETT. Developing wireless sensor networks for monitoringcrop canopy temperature using a moving sprinkler system as a platform. Applied Engine-ering in Agriculture,2010,26(2):331-341
    46P MORREALE, F QI, P CROFT. A green wireless sensor network for environmentalmonitoring and risk identification. International Journal of Sensor Networks,2011,10(1-2):73-82
    47N LI, B YAN, G L CHEN, P GOVINDASWAMY, J WANG. Design and implementation ofa sensor-based wireless camera system for continuous monitoring in assistive environments.Personal and Ubiquitous Computing,2010,14(6):499-510
    48T NAGAYAMA, B F J SPENCER, J A RICE. Autonomous decentralized structural healthmonitoring using smart sensors. Structural Control&Health Monitoring,2009,16(7-8):842-859
    49G M SONG, Z G WEI, W J ZHANG, A G SONG. Design of a networked monitoring systemfor home automation. IEEE Transactions on Consumer Electronics,2007,53(3):933-937
    50A HANDE, T POLK, W WALKER, D BHATIA. Self-powered wireless sensor networks forremote patient monitoring in hospitals. Sensors,2006,6(9):1102-1117
    51T GAO, T MASSEY, L SELAVO, D CRAWFORD, B R CHEN, et al. The advanced healthand disaster aid network: A light-weight wireless medical system for triage. IEEE Transac-tions on Biomedical Circuits and Systems,2007,1(3):203-216
    52R BRUNO, M CONTI, E GREGORI. Mesh networks: Commodity multihop ad hoc net-works. IEEE Communications Magazine,2005,43(3):123-131
    53J H HUANG, L C WANG, C J CHANG. QoS provisioning in a scalable wireless meshnetwork for intelligent transportation systems. IEEE Transactions on Vehicular Technology,2008,57(5):3121-3135
    54F M ZOU, X H JIANG, Z X LIN, T S WANG. A banyan-tree topology based railwaywireless mesh network architecture. Tiedao Xuebao/Journal of the China Railway Society,2010,32(2):47-54
    55Y ZHOU, J G H EVANS, M CHOWDHURY, K C WANG, R FRIES. Wireless communica-tion alternatives for intelligent transportation systems: A case study. Journal of IntelligentTransportation Systems: Technology, Planning, and Operations,2011,15(3):147-160
    56A N PLYMOTH, U KORNER, P JOHANSSON. Urban mesh and ad hoc mesh networks.International Journal of Network Management,2008,18(2):107-127
    57S FAN, X ZHANG, W G XU, J N CAO, Y REN. WMN-based city traffic informationacquisition system. Journal of China Universities of Posts and Telecommunications,2007,14(S1):1-5
    58K C LAN, Z WANG, M HASSAN, T MOORS, R BERRIMAN, L LIBMAN, M OTT, BLANDFELDT, Z ZAIDI. Experiences in deploying a wireless mesh network testbed fortraffic control. Computer Communication Review,2007,37(5):19-28
    59A ESMAILPOUR, N NASSER, T TALEB. Topological-cased architectures for wirelessmesh networks. IEEE Wireless Communications,2011,18(1):74-81
    60A ESMAILPOUR, M JASEEMUDDIN, N NASSER, O BAZAN. Ad-hoc path: An alterna-tive to backbone for wireless mesh networks. Proc. IEEE ICC2007, Glasgow, UK, June2007:3752-3757
    61M A HAMID, M ABDULLAH-AL-WADUD, C S HONG, O CHAE, S LEE. A robustsecurity scheme for wireless mesh enterprise networks. Annales Des Telecommunications–Annals of Telecommunications,2009,64(5-6):401-413
    62A RANIWALA, T C CHIUEH. Evaluation of a wireless enterprise backbone network archi-tecture. Proc.12th Annual IEEE Symposium on High Performance Interconnects, Stanford,CA, USA, Aug.25-27,2004:98-104
    63T HE, S H G CHAN, C F WONG. HomeMesh: A low-cost indoor wireless mesh for homenetworking. IEEE Communications Magazine,2008,46(12):79-85
    64F BIRLIK, O GUERBUEZ, O ERCETIN. IPTV home networking via802.11wireless meshnetworks: An implementation experience. IEEE Transactions on Consumer Electronics,2009,55(3):1192-1199
    65I F AKYILDIZ, X D WANG. Wireless Mesh Networks. John Wiley&Sons Ltd, UK,2009:197-213
    66F A ZDARSKY, S ROBITZSCH, A BANCHS. Security analysis of wireless mesh backhaulsfor mobile networks. Journal of Network and Computer Applications,2011,34(2):432-442
    67L LAZOS, M KRUNZ. Selective jamming/dropping insider attacks in wireless mesh net-works. IEEE Network,2011,25(1):30-34
    68O E MUOGILIM, K K LOO, R COMLEY. Wireless mesh network security: A traffic engi-neering management approach. Journal of Network and Computer Applications,2011,34(2):478-491
    69P YI, Y WU, F T ZOU, N LIU. A survey on security in wireless mesh networks. IETETechnical Review,2010,27(1):6-14
    70B KWON, R A BEYAH, J A COPELAND. Key challenges in securing WiMAX mesh net-works. Security and Communication Networks,2009,2(5):413-426
    71S GLASS, M PORTMANN, V MUTHUKKUMARASAMY. Securing wireless mesh net-works. IEEE Internet Computing,2008,12(4):30-36
    72Y C ZHANG, Y G FANG. ARSA: An attack-resilient security architecture for multihopwireless mesh networks. IEEE Journal on Selected Areas in Communications,2006,24(10):1916-1928
    73K REN, S C YU, W J LOU, Y C ZHANG. PEACE: A novel privacy-enhanced yet account-able security framework for metropolitan wireless mesh networks. IEEE Transactions onParallel and Distributed Systems,2010,21(2):203-215
    74F MARTIGNON, S PARIS, A CAPONE. DSA-Mesh: A distributed security architecture forwireless mesh networks. Security and Communication Networks,2011,4(3):242-256
    75J Y SUN, C ZHANG, Y C ZHANG, Y G FANG. SAT: A security architecture achievinganonymity and traceability in wireless mesh networks. IEEE Transactions on Dependableand Secure Computing,2011,8(2):295-307
    76Z BANKOVIC, D FRAGA, J M MOYA, J C VALLEJO, P MALAGON, et al. Improvingsecurity in WMNs with reputation systems and self-organizing maps. Journal of Networkand Computer Applications,2011,34(2):455-463
    77P S MOGRE, K GRAFFI, M HOLLICK, R STEINMETZ. A security framework forwireless mesh networks. Wireless Communications&Mobile Computing,2011,11(3):371-391
    78D AGUAYO, J BICKET, S BISWAS, G JUDD, R MORRIS. Link-level measurements froman802.11b mesh network. Computer Communication Review,2004,34(4):121-131
    79D AGUAYO, J BICKET, S BISWAS, D S J DE COUTO, R MORRIS. MIT Roofnetimplementation. Aug.2011, available at http://pdos.lcs.mit.edu/roofnet/design/
    80J BICHET, D AGUAYO, S BISWAS, R MORRIS. Architecture and evaluation of anunplanned802.11b mesh network. Proc. ACM11th Annual International Conference onMobile Computing and Networking, MobiCom2005, Cologne, Germany, Aug.8-Sep.2,2005:31-42
    81A RANIWALA, T C CHIUEH. Architecture and algorithm for an IEEE802.11-based multi-channel wireless mesh network. Proc. IEEE INFOCOM2005, Miami, FL, USA, Mar.13-17,2005,3:2223-2234
    82A RANIWALA, K GOPALAN, T CHIUEH. Centralized channel assignment and routingalgorithms for multi-channel wireless mesh networks. Computing and CommunicationsReview,2004,8(2):50-65
    83BWN LAB. Wireless mesh networks. Aug.2011, available at http://www.ece.gatech.edu/research/labs/bwn/mesh
    84C CICCONETTI, I F AKYILDIZ, L LENZINI. FEBA: A bandwidth allocation algorithmfor service differentiation in IEEE802.16mesh networks. IEEE-ACM Transactions onNetworking,2009,17(3):884-897
    85S AVALLONE, I F AKYILDIZ, G VENTRE. A channel and rate assignment algorithm and alayer-2.5forwarding paradigm for multi-radio wireless mesh networks. IEEE-ACM Tran-sactions on Networking,2009,17(1):267-280
    86K R CHOWDHURY, M D FELICE, L BONONI. A fading and interference aware routingprotocol for multi-channel multi-radio wireless mesh networks. Proc.6th ACM Interna-tional Symposium on Performance Evaluation of Wireless Ad-Hoc, Sensor, and UbiquitousNetworks, Tenerife, SPAIN, Oct.28-29,2009:1-8
    87EU-MESH. Enhanced, ubiquitous, and dependable broadband access using mesh networks.Aug.2011, available at http://www.eu-mesh.eu/
    88V SIRIS, I G ASKOXYLAKIS, M CONTI, R BRUNO. Enhanced, ubiquitous and depend-able broadband access using mesh networks. ERCIM Newsletter, Issue73,2008,4:50-51
    89MICROSOFT. Self organizing wireless mesh networks. Aug.2011, available at http://research.microsoft.com/en-us/projects/mesh/
    90MOTOROLA. Mesh wide area networks: Building better wireless connectivity outdoors.Aug.2011, available at http://www.motorola.com/web/Business/Products/Wireless%20Networks/Wireless%20Broadband%20Networks/Mesh%20Networks/_Documents/_static%20file/Mesh_Wide_Area_Networks_Overview_Brochure.pdf?localeId=33
    91P ZWINKELS. Wireless mesh network: Extending the reach of wireless LAN, securely andcosteffectively. Journal of the Communications Network,2004,3(4):47-52
    92TROPOS NETWORKS. A technology whitepaper: Metro-scale mesh networking withTropos metromesh architecture. July2007, available at http://www.tropos.com/technology/whitepaper.shtml
    93W S CONNER, J KRUYS, K J KIM, J C ZUNIGA. IEEE802.11s tutorial: Overview of theamendment for wireless local area mesh networking. Nov.2006, available at http://www.ieee802.org/802_tutorials/06-November/802.11s_Tutorial_r5.pdf
    94IEEE802.11WORKING GROUP. Draft amendment to standard for information technology–telecommunications and information exchange between systems–LAN/MAN specificrequirements–Part11: wireless medium access control (MAC) and physical layer (PHY)specifications: amendment: ESS mesh networking, IEEE P802.11s/D0.03, Aug.2006
    95IEEE802.15WORKING GROUP. IEEE recommended practice for information technology–telecommunications and information exchange between systems–local and metropolitanarea networks–specific reqirements Part15.5: mesh topology capability in wirelesspersonal area networks (WPANs). May2009, available at http://standards.ieee.org/about/get/802/802.15.html
    96IEEE802.16WORKING GROUP. IEEE standard for local and metropolitan area networks-Part16: air interface for fixed broadband wireless access systems. Oct.2004, available athttp://standards.ieee.org/about/get/802/802.16.html
    97IEEE802.16WORKING GROUP. IEEE standard for local and metropolitan area networks-Part16: air interface for fixed and mobile broadband wireless access systems-Amendment2: physical and medium access control layers for combined fixed and mobileoperation in licensed bands. Feb.2006, available at http://www.ieee802.org/16/pubs/80216e.html
    98IEEE802.16WORKING GROUP. IEEE standard for local and metropolitan area networks-Part16: air interface for broadband wireless access systems–Amendment1: multihoprelay specification, June2009, available at http://standards.ieee.org/about/get/802/802.16.html
    99方旭明,孙淑杰,何蓉.一种802.11s无线Mesh网络快速切换方案.西南交通大学学报,2010,45(5):725-731
    100易平,吴越,邹福泰,柳宁,陈佳霖.基于免疫机制的无线Mesh网络安全模型.上海交通大学学报,2010,44(2):264-270
    101曾锋.无线Mesh网流量负载均衡关键技术研究.中南大学博士学位论文,2010:1-20
    102中国移动通信.上海公司WiFi Mesh试验项目总结. Nov.2008, available at http://www.docin.com/p-225788555.html
    103杜振国,洪佩琳,周武,薛开平.多射频无线Mesh网中的接口分域信道分配.电子学报,2011,39(3):723-726
    104赵锦琳,张国鹏,张海林.无线Mesh网络MAC性能的博弈分析及优化.计算机科学,2008,35(11):88-91
    105曹春杰,杨超,马建峰,朱建明. WLAN Mesh漫游接入认证协议.计算机研究与发展,2009,46(7):1102-1109
    106马卓,马建峰,曾勇,沈玉龙.通用可组合安全的WLAN Mesh网络可信接入认证协议.通信学报,2008,29(10):126-134
    107王嵚琦,何新贵,徐明.无线Mesh网络的路径容量分析模型及算法.计算机研究与发展,2008,45(增刊):393-399
    108沈呈,陆一飞,夏勤.基于综合判据的无线Mesh网路由协议.计算机学报,2010,33(12):2300-2311
    109符云清,王松健,吴中福.基于链路状态加权的无线Mesh网络路由协议.计算机研究与发展,2009,46(1):137-143
    110向东,张跃鲤. Mesh网中高效无死锁自适应路由算法.计算机学报,2007,30(11):1954-1962
    111方艺霖,李方敏,吴鹏,刘新华,马小林.无线Mesh网络组播路由协议.软件学报,2010,21(6):1308-1325
    112樊秀梅,李晓辉,何骞.无线Mesh网络中的组播机会路由研究.电子学报,2010,38(1):32-36
    113R WEST. The phychology of security. Communications of the ACM,2008,51(4):34-40
    114A KINICHI. Organizational Behavior: Core Concepts.王慧敏,王慧英译.北京:电子工业出版社,2009:96-111
    115M GRABOWSKI, K H ROBERTS. Human and organizational error in large scale systems.IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans,1996,26(1):2-16
    116L KLEINROCK, W NAYLOR. On measured behavior of the ARPA network. Proc. NationalComputer Conference and Exposition, AFIPS’74, Chicago, Illinois, USA, May6-10,1974:767-780
    117W LELAND, M TAQQU, W WILLINGER, et al. On the self-similar nature of Ethernettraffic. IEEE/ACM Transactions on Networking,1994,2(2):1-15
    118雷霆.基于复杂性理论的计算机网络行为研究.中国矿业大学博士学位论文,2009:1-20
    119D E DENNING. An intrusion-detection model. IEEE Transactions on Software Engineering,1987,13(2):222-232
    120D GEER. Behavior-based network security goes mainstream. Computer. IEEE ComputerSociety,2006,39(3):14-17
    121屈延文.软件行为学.北京:电子工业出版社,2004:8-20
    122A T MIZRAK, Y C CHENG, K MARZULLO, S SAVAGE. Detecting and isolating mali-cious routers. IEEE Transactions on Dependable and Secure Computer,2006,3(3):230-244
    123S CHANG, T E DANIELS. Node behavior based fast malware detection for enterprisenetworks. Proc.2010IEEE Global Telecommunications Conference, GLOBECOM2010,Miami, FL, USA, Dec.6-10,2010:1-5
    124L Q TIAN, C LIN. Computation and analysis of node intending trust in WSNs. Proc.2010IEEE International Conference on Wireless Communications, Networking and InformationSecurity, WCNIS2010, Beijing, China, June25-27,2010:496-499
    125B WANG, C H HUANG, W Z YANG, T WANG. An individual behavior-based trust routingmodel for ad hoc networks. Proc.2009International Conference on Multimedia InformationNetworking and Security, MINES2009, Wuhan, China, Nov.18-20,2009:454-457
    126W DIFFIE, M E HELLMAN. New directions in cryptography. IEEE Transactions onInformation Theory,1976, IT-22(6):644-654
    127T MATSUMOTO, Y TAKASHIMA, H IMAI. On seeking smart public-key distributionsystems. Transactions of the IECE of Japan,1986, E69(2):99-106
    128A MENEZES, M QU, S A VANSTONE. Some new key agreement protocols providingimplicit authentication. Proc. Workshops on Selected Areas in Cryptography, SAC’95, May18-19,1995:22-32
    129L LAW, A MENEZES, M QU, J SOLINAS, S A VANSTONE. An efficient protocol forauthenticated key agreement. Designs, Codes and Cryptography,2003,28(2):119-134
    130W DIFFIE, P C VAN OORSCHOT, M J WIENER. Authentication and authenticated keyexchanges. Designs, Codes and Cryptography,1992,2(5):107-125
    131D HARKINS, D CARREL. The Internet key exchange protocol (IKE). IETF RFC2409,1998
    132C KAUFMAN. Internet key exchange (IKEv2) protocol. IETF RFC4306,2005
    133R DUTTA, R BARUA. Overview of key agreement protocols. IACR Cryptology ePrintArchive, available at http://eprint.iacr.org/2005/289,2005:1-46
    134A JOUX. A one round protocol for tripartite Diffie-Hellman. Lecture Notes in ComputerSciences, Springer-Verlag,2000,1838:385-394
    135G YAO, D G FENG. Pairwise key agreement protocols based on the Weil pairing. Journal ofSoftware,2006,17(4):907-914
    136E OKAMOTO. Key distribution systems based on identification information. Advances inCryptology-Crypto’87, Lecture Notes in Computer Sciences, Springer-Verlag,1987,293:194-202
    137N P SMART. An identity-based authenticated key agreement protocol based on the Weilpairing. Electronic Letters,2002,38(13):630-632
    138L CHEN, C KUDLA. Identity based authenticated key agreement protocols from pairings.Proc.16th IEEE Computer Security Foundations Workshop, CSFW2003, Pacific Grove, CA,USA, June30-July2,2003:219-233
    139N MCCULLAGH, P S L M BARRETO. A new two-party identity-based authenticated keyagreement. The Cryptographers’ Track at the RSA Conference2005, Lecture Notes inComputer Sciences, Springer-Verlag,2005,3376:262-274
    140I G ASKOXYLAKIS, T TRYFONAS, J MAY, V SIRIS, A TRAGANITIS. A family of keyagreement mechanisms for mission critical communications for secure mobile ad hoc andwireless mesh internetworking. EURASIP Journal on Wireless Communications and Net-working,2011, Article ID80/684,17pages
    141A O DURAHIM, E SAVAS. A2-MAKE: An efficient anonymous and accountable mutualauthentication and key agreement protocol for WMNs. Ad Hoc Networks,2011,9(7):1202-1220
    142Z G WAN, K REN, B ZHU, B PRENEEL, M GU. Anonymous user communication forprivacy protection in wireless metropolitan mesh networks. IEEE Transactions on VehicularTechnology,2010,59(2):519-532
    143IEEE802.11i WORKING GROUP. Supplement to Standard for Telecommunications andInformation Exchange between Systems-LAN/MAN Specific Requirements-Part11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications:Specification for Enhanced Security, IEEE802.11i, July2004
    144IEEE-SA STANDARDS BOARD. IEEE Standards for Local and Metropolitan Area Net-works: Port based Network Access Control, IEEE Std802.1X-2004, Dec.2004
    145R C CARRANO, L C S MAGALHAES, D C M SAADE, C V N ALBUQUERQUE. IEEE802.11s multihop MAC: A tutorial. IEEE Communications Surveys and Tutorials,2011,13(1):52-67
    146彭清泉.无线网络中密钥管理与认证方法及技术研究.西安电子科技大学博士学位论文,2010:43-50
    147IEEE802.16WORKING GROUP. IEEE standard for local and metropolitan area networks–Part16: Air interface for fixed broadband wireless access systems, Oct.2004
    148ITU-T STUDY GROUP17. International Standard ISO/IEC9594-8, ITU-T Recommenda-tion X.509, Information technology–Open systems interconnection–The directory:Public-key and attriture certificate frameworks. ITU-T Recommendation A.8Procedure,Nov.2008
    149A DURRESI, M DURRESI, L BAROLLI. Secure spatial authentication for mobile stationsin hybrid3G-WLAN serving networks. Proc.3rd International Conference on Availability,Reliability and Security, ARES2008, Barcelona, Spain, Mar.4-7,2008:1325-1331
    150Y B LIN, Y K CHEN. Reducing authentication signaling traffic in third-generation mobilenetwork. IEEE Transactions on Wireless Communications,2003,2(3):493-501
    151M LONG. Roaming authentication and end-to-end authentication in wireless security. PhD.Dissertation, Auburn University, Aug.2005:16-24
    152X H LI, W D YANG, S J MOON, J F MA. Authentication method for802.11s infrastructuremode. Proc.2006International Comference on Communications and Networking in China,ChinaCom’06, Beijing, China, Oct.25-27,2006:1-5
    153M LONG, C H J WU, J D IRWIN. Localized authentication for wireless LAN internetworkroaming. Proc.2004IEEE Wireless Communications and Networking Conference,WCNC2004, Atlanta, Georgia, USA, Mar.21-25,2004,1:264-267
    154B CHOR, A FIAT, M NAOR. Tracing traitors. Advances in Cryptology, CRYPTO’94,Lecture Notes in Computer Sciences, Springer-Verlag,1994,839:257-270
    155M NAOR, B PINKAS. Threshold traitor tracing. Advances in Cryptology, CRYPTO’98,Lecture Notes in Computer Science, Springer-verlag,1998,1462:502-517
    156A SILVERBERG, J STADDON, J L WALKER. Applications of list decoding to tracingtraitors. IEEE Transactions on Information Theory,2003,49(5):1312-1318
    157B PFITZMANN. Trail of traced traitor. Proc. Information Hiding1996, Lecture Notes inComputer Science, Springer-verlag,1996,1174:49-64
    158J H PARK, D H LEE. Fully collusion-resistant traitor tracing scheme with shorter cipher-texts. Designs Codes and Cryptography,2011,60(3):255-276
    159K Y TSAI, T C WU, C L HSU. New secret key traitor tracing scheme with dispute settle-ment from bilinear maps. International Journal of Innovative Computing Information andControl,2011,7(3):1499-1510
    160Y T WANG, K F CHEN, J H CHEN. Attribute-based traitor tracing. Journal of InformationScience and Engineering,2011,27(1):181-195
    161H NAKAYAMA, A JAMALIPOUR, N KATO. Network-based traitor-tracing techniqueusing traffic pattern. IEEE Transactions on Information Forensics and Security,2010,5(2):300-313
    162A FIAT, T TASSA. Dynamic traitor tracing. Advances in Cryptology, CRYPTO’99, LectureNotes in Computer Science, Springer-verlag,1999,1666:354-371
    163O BERKMAN, M PARNAS, J SGALL. Efficient dynamic traitor tracing. Proc.11th AnnualACM-SIMA Symposium Discrete Algorithms, SODA2000, San Francisco, California, USA,Jan.9-11,2000:586-595
    164R SAFAVI-NAINI, Y J WANG. Sequential traitor tracing. IEEE Transactions on Informa-tion Theory,2003,49(5):1319-1326
    165G OHTAKE, K OGAWA, G HANAOKA, H IMAI. A trade-off traitor tracing scheme.IEICE Transactions on Information and Systems,2009, E92D(5):859-875
    166E RASMUSEN. Games and Information: An Introduction to Game Theory (Fourth Edition).韩松,张倩伟,庞立永,张中元,李长卿译.北京:中国人民大学出版社,2009:51-61
    167H W KUHN. Classics in Game Theory.韩松,刘世军,张倩伟译.北京:中国人民大学出版社,2004:32-40
    168张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展.武汉大学学报(理学版),2006,52(5):513-518
    169Y L ZHENG. Digital signcryption or how to achieve cost(signature&encryption)<    170Y L ZHENG. Signcryption and its applications in efficient public key solutions. InformationSecurity Workshop, ISW’97, Lecture Notes in Computer Science, Springer-Verlag,1998,1397:291-312
    171Y ZHENG. Shortened digital signature, signcryption and compact and unforgeable keyagreement schemes. IEEE P1363a: Standard Specifications for Public-Key Cryptography:Additional Techniques,1998
    172X Y WANG, H D YU. How to break MD5and other hash functions. Advances in Cryptology,CRYPTO2005, Lecture Notes in Computer Science, Springer-verlag,2005,3494:19-35
    173中华人民共和国国务院.国家突发公共事件总体应急预案. Aug.2005, available athttp://www.gov.cn/yjgl/2005-08/07/content_21048.htm
    174孙玉.应急通信技术总体框架讨论.北京:人民邮电出版社,2009:1-18
    175李文峰,韩晓冰,汪仁,张登福.现代应急通信技术.西安:西安电子科技大学出版社,2007:1-10
    176C H LIM, P J LEE. Modified Maurer-Yacobi’s scheme and its applications. Advances inCryptology, AUSCRYPT’92, Lecture Notes in Computer Science, Springer-Verlag,1993,718:308-323
    177C H LIM, P J LEE. Directed signatures and application to threshold cryptosystems.Advances in Cryptology, CRYPTO’97, Lecture Notes in Computer Science, Springer-Verlag,1997,1189:131-138
    178S LAL, M KUMAR. A directed signature scheme and its applications. Cornell UniversityLibrary, Sep.2004, available at http://arxiv.org/abs/cs/0409036
    179PUBLIC SAFETY BROADBAND CONSORTIUM. Wireless solutions for public safety&public access. Public Safety Broadband Consortium Brochure, Aug.2010, available athttp://publicsafetycommunications.org
    180MESHNETWORKS.4.9GHz applications and technology workgroup presentation. Techni-cal Report, Sep.28,2004
    181M SEO, K KIM. Electronic Funds Transfer Protocol Using Domain-Verifiable SigncryptionScheme. Information Security and Cryptography, ICIS’99, Lecture Notes in ComputerScience, Springer-Verlag,2000,1787:269-277

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700