首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
本文首先分析了现有移动Ad Hoc网络的两类路由协议及其优缺点,接着提出将移动代理应用于按需路由的方案。通过移动代理更新节点路由表,从而在网络负载增加不大的情况下,减小路由请求发起数,降低端到端的数据传输延迟。还可在移动代理中加入节点能量信息、节点负载信息等,通过移动代理在网络中漫游,收集并更新途经节点的相应信息,从而达到节能和缓解网络拥塞的目的。  相似文献   

2.
移动代理在MANET路由协议中的应用研究   总被引:1,自引:0,他引:1  
移动Ad Hoc网络(MANET)是由移动节点组成的分布式异构网络,其路由协议的研究是该领域的焦点之一。本文分析了现有移动Ad Hoc网络两类路由协议的优缺点,接着提出将移动代理应用于AODV路山协议的方案,最后给出了初步的仿真结果。仿真结果表明,通过移动代理的漫游更新途经节点路由表,可以在网络负载增加不人的情况下,减少路由发起数,降低端到端的数据传输延迟。  相似文献   

3.
一种代理移动IPv6认证协议   总被引:3,自引:0,他引:3       下载免费PDF全文
周华春  张宏科  秦雅娟 《电子学报》2008,36(10):1873-1880
代理移动IPv6为移动节点提供了基于网络的移动性管理方法,移动节点不参与管理移动性信令.为了在移动互联网络中应用代理移动IPv6协议,需要定义安全有效的认证协议.目前还没有见到关于代理移动IPv6认证协议方面的研究,本文提出了一种代理移动IPv6的认证协议,该认证协议可以提供接入认证功能,并可防止重放攻击和密钥暴露.为了分析该认证协议的性能,本文给出了认证费用和认证延迟分析的解析模型,分析了移动性和流量参数对认证费用和认证延迟的影响.研究结果表明提出的代理移动IPv6认证协议安全有效.  相似文献   

4.
江兴峰 《通讯世界》2002,8(11):54-56
问题的提出在移动IPv4中,当移动节点漫游到外地网络时,由通信对端送给连接在外地链路上的移动节点的数据包先被送到它的本地代理,然后经隧道送到移动节点的转交地址。然而,由移动节点发出的数据包却被直接送到通信对端,这就是移动IP协议中的三角路由问题。路由优化机制主要是用来解决三角路由问题,使得通信对端发送的数据包能够直接送到移动节点而无需本地代理的干预。这种经过优化的路由在时延和资源消耗方面都比三角路由好,改善了移动IP协议的性能。图1为三角路由和优化路由的比较。图1中的红线表示通信对端和移动节点之间经过…  相似文献   

5.
分析了移动自组网的异构性、路由协议和能量保护问题,应用移动代理和主动网络技术,给出了一个开放的、扩展性强的基于移动代理的主动自组网构架,该构架通过分群策略,使多个路由协议能在异构环境下并行工作,而且也满足移动节点能量保护的需求。  相似文献   

6.
移动IPv6安全问题分析   总被引:5,自引:0,他引:5  
移动IPv6协议作为下一代互联网解决移动通信的基本理论,为解决“三角路由”问题和更好的支持节点移动,定义了一些控制信令和新的移动扩展头,但同时也带来了新的安全威胁,为此提出了一些安全策略来保护控制信令。本文探讨了移动IPv6协议主要面临的安全威胁,分析了通过IPSec安全联盟来保护移动节点和家乡代理之间的控制信令以及RR协议来保护移动节点和通信节点之间的控制信令的安全策略。  相似文献   

7.
一个安全的门限代理签名方案   总被引:1,自引:0,他引:1  
针对现有的门限代理签名方案中所存在的合谋攻击,提出了一个安全的门限代理签名方案。合谋攻击是指在不知道任何有效的门限代理签名的情况下, 恶意代理成员人数大于或等于门限值时, 他们能合谋重新构造代理群的秘密多项式函数, 得到代理群的秘密参数, 从而可以伪造其他代理成员的代理签名。提出的新方案不仅能满足门限代理签名的性质,而且能抵抗合谋攻击。另外,该方案能根据原始签名人的需要,撤消代理签名人的代理签名权。  相似文献   

8.
七号信令网络由于缺乏安全机制而存在诸多安全漏洞。通过分析攻击者如何利用MTP3层的网络管理消息对七号信令网实施攻击,提出用密钥交换协议和认证头协议对MTP3层进行安全保护,从而实现了信令节点间的相互认证和对消息的完整性保护,增强了七号信令网络的安全性。  相似文献   

9.
移动IP在全球范围内的应用引入了许多安全问题,其中以认证问题最为关键,特别是当移动节点在外地链路上漫游时这种问题尤为明显。论文介绍了移动IP的认证机制以及针对其缺陷进行的DoS攻击,提出了一系列防范措施。理论分析表明,这些防范措施可以在一定程度上对DoS攻击进行防范,并维护移动IP网络的系统安全。  相似文献   

10.
AAA在移动IP中的应用探讨   总被引:2,自引:1,他引:1  
移动IP解决了移动节点在不改变IP地址的情况下的漫游问题,移动节点在漫游时,外地域通过AAA 服务器对其进行安全认征、授权、计费。本文探讨了一种AAA下移动IP的认证注册方案。在注册过程中利用公钥和对称密钥实现移动节点和网络的双向认证。  相似文献   

11.
Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute-based encryption scheme with policy dynamic updating was proposed.In the scheme,an anonymous key issuing protocol was introduced to protect users’ privacy and resist collusion attack of attribute authority.The scheme with dynamic policy updating technique was secure against chosen plaintext attack under the standard model and can support any types of policy updating.Compared to the existing related schemes,the size of ciphertext and users’ secret key is reduced and can significantly reduce the computation and communication costs of updating ciphertext.It is more effective in the practical application.  相似文献   

12.
针对云计算中数据位置验证存在的共谋攻击,本文提出了抗共谋攻击的数据位置验证协议.首先给出了数据位置验证的系统模型,分析了安全威胁,并给出了数据位置验证的安全定义.随后,将安全定位协议与数据持有性证明协议相结合,设计了一维空间下的数据位置验证协议,并证明了所提协议满足安全定义且能抵御共谋攻击.在一维协议基础之上,构建了三维空间下的数据位置验证协议.最后,在三维空间下将本文所提协议与Lost协议和Geoproof协议进行了性能的测试和比较.结果表明所提协议能够验证服务器具体位置且能抵御共谋攻击.  相似文献   

13.
The cloud computing technology has emerged, developed, and matured in recent years, consequently commercializing remote outsourcing storage services. An increasing number of companies and individuals have chosen the cloud to store their data. However, accidents, such as cloud server downtime, cloud data loss, and accidental deletion, are serious issues for some applications that need to run around the clock. For some mission and business-critical applications, the continuous availability of outsourcing storage services is also necessary to protect users' outsourced data during downtime. Nevertheless, ensuring the continuous availability of data in public cloud data integrity auditing protocols leads to data privacy issues because auditors can obtain the data content of users by a sufficient number of storage proofs. Therefore, protecting data privacy is a burning issue. In addition, existing data integrity auditing schemes that rely on semi-trusted third-party auditors have several security problems, including single points of failure and performance bottlenecks. To deal with these issues, we propose herein a blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection. We realize a concrete construction by using a verifiable delay function with high efficiency and proof of retrievability, and prove the security of the proposal in a random oracle model. The proposed construction supports dynamic updates for the outsourced data. We also design smart contracts to ensure fairness among the parties involved. Finally, we implement the protocols, and the experimental results demonstrate the efficiency of the proposed protocol.  相似文献   

14.
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy. A cryptographic protocol specifies a process by which some information is transferred among some users and hidden from others. We show how to implement anonymous credit cards using simple cryptographic protocols. We pose, and solve, a collusion problem which determines whether it is possible for a subset of users to discover information that is designed to be hidden from them during or after execution of the anonymous credit card protocol  相似文献   

15.
Routing protocol of MANET works with the presumption that nodes will transmit the data in collaboration. This presumption is a limitation of routing protocol which gives an occasion to attackers to hinder the security of the device and data in the network. Therefore, it becomes vital to develop methods and systems which will ensure the safety, integrity and confidentiality of data in such devices and systems. Although, existing IDS are able to detect various types of attack but some misbehavior goes undetected which potentially damage the network. Collusion attack is one such misbehavior where nodes perform maliciously in collaboration with neighboring nodes without being detected. In this work, Intrusion detection algorithm has been proposed that can effectively detect and isolate colluding nodes from the network so that these malicious nodes do not affect the performance of the network . Proposed detection algorithm uses in–out traffic information and overhearing statistics of nodes to identify colluding attackers. Detection algorithm works successfully for DSR routing protocol. Experimental results on NS-2 show that the proposed algorithm is capable of reducing the packet drops consequently improving the throughput of the network in presence of collusion attack.  相似文献   

16.
由于目前基于匿名水印协议版权管理的共谋容限性较弱,或者保证共谋容限性的协议较复杂,文中提出了一种新的匿名水印协议,并对新协议的性能进行了分析。新协议的创新点在于,匿名水印由销售者生成,且经可信方CA对其部分进行置乱处理后方可作为有效水印。此协议保证了较强的共谋容限性,同时,在不传输原始作品的前提下,匿名水印仍然能由含边信息的水印系统生成。  相似文献   

17.
In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data.  相似文献   

18.
基于Merkle树的安全移动代理路由协议及其推广   总被引:2,自引:0,他引:2       下载免费PDF全文
柳毅  姜正涛  王育民 《电子学报》2005,33(7):1250-1253
本文对Domingo J.等人提出的一个高效的移动代理路由协议进行了分析,指出其具有一个很严重的安全缺陷:不能抵制路由主机间的共谋攻击.在此基础上,利用hash函数,提出了一个基于Merkle树的安全移动代理路由协议,并分析了其安全性、计算复杂度以及信息传输量.结果表明该方案不仅弥补了原有协议的缺陷,而且保持了原协议高效的特点.最后,将该方案其推广至动态路由.  相似文献   

19.
提出一种分簇无线传感器网络中匿名的簇头选举协议。给出了匿名簇头选举的判定规则及成簇模式,并采用基于双线性对的匿名否决协议对选举结果进行验证以保证存在节点成功当选。设计了相应的匿名数据聚合方案,无需泄露节点身份信息即可完成聚合。分析及仿真结果表明,协议同时实现了簇头选举的匿名性、高效性及安全性,可有效抵抗窃听攻击、节点妥协攻击及合谋攻击等恶意行为。  相似文献   

20.
基于安全多方计算的可信防共谋协议模型   总被引:1,自引:0,他引:1  
n个互不信任的参与方共同计算一个函数,其中部分参与方形成联盟,通过共谋而破坏其他参与方的安全性,利用安全多方计算技术和通信通道,针对可嵌套共谋,提出可信防共谋协议模型。将模型运用到博弈论中,借助相关均衡的概念取代了可信第三方。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号