Advanced Search
Volume 31 Issue 10
Dec.  2010
Turn off MathJax
Article Contents
Luo Chang-yuan, Li Wei, Li Hai-lin, Jian Bo. Measurement Method for Space Networks Authenticated Key Security under Distributed CA[J]. Journal of Electronics & Information Technology, 2009, 31(10): 2316-2320. doi: 10.3724/SP.J.1146.2008.01343
Citation: Luo Chang-yuan, Li Wei, Li Hai-lin, Jian Bo. Measurement Method for Space Networks Authenticated Key Security under Distributed CA[J]. Journal of Electronics & Information Technology, 2009, 31(10): 2316-2320. doi: 10.3724/SP.J.1146.2008.01343

Measurement Method for Space Networks Authenticated Key Security under Distributed CA

doi: 10.3724/SP.J.1146.2008.01343 cstr: 32379.14.SP.J.1146.2008.01343
  • Received Date: 2008-10-14
  • Rev Recd Date: 2009-03-17
  • Publish Date: 2009-10-19
  • The key management schemes bsaed on Distributed Certificate Authority resolve the difficulty to adopting concentrating key management in space networks, but result in some new threats of authenticated key. Based on discribing and analyzing the threats suffered by authenticated key of space networks, a measurement method for security intensity of authenticated key is proposed. The method can quantitatively measure the security intensity of authenticated key according to the setting of parameters, such as threshold value, key-update period etc. By analyzing the impact of threshold value and key-update period on authenticated key security, a method of setting the two networks security parameters reasonably is given.
  • loading
  • 徐志博, 马恒太. 一种用于卫星网络安全认证的协议设计与仿真[J]. 计算机工程与应用, 2007, 43(17): 130-132.Xu Zhi-bo and Ma Heng-tai. Design and simulation ofsecurity authentication protocol for satellite network [J].Computer Engineering and Applications, 2007, 43(17):130-132.[2]唐志华. 基于临近空间的目标探测及宽带通信[J]. 无线电工程, 2007, 37(11): 28-30.Tang Zhi-hua. Target acquisition and broadbandcommunications based on near-space vehicles [J]. RadioEngineering of China. 2007, 37(11): 28-30.[3]杨德明, 慕德俊, 许钟. Ad hoc 空间网络密钥管理与认证方案[J]. 通信学报. 2006, 27(8): 104-107.Yang De-ming, Mu De-jun, and Xu Zhong. Novel keymanagement and authentication scheme for Ad hoc spacenetworks [J]. Journal on Communications, 2006, 27(8):104-107.[4]Zhou L and Hass Z J. Securing Ad hoc networks [J]. IEEENetworks, 1999, 13(6): 24-30.[5]Wu B, Wu J, and Fernandez E B, et al.. Secure and efficientkey management in mobile Ad hoc networks[C]. Proc of the19th IEEE International Parallel and Distributed ProcessingSymposium (IPDPS05). Denver: IEEE Computer Society.2005: 288-295.[6]Dong Y, Wing G, and Sui A, et al.. Providing distributedcertificate authority service in mobile ad hoc networks[C].Proc of the First International Conference on Security andPrivacy for Emerging Areas in Communications Networks.Athens: IEEE Computer Society, 2005: 149-156.[7]曾萍, 陈瑞利, 方勇. 基于自认证公钥的全分布式移动Adhoc 网络密钥管理方案[J]. 计算机应用研究, 2008, 25(6):1779-1782.Zeng Ping, Chen Rui-li, and Fang Yong. Fully-distributedkey management scheme based on self-certified public key formobile Ad hoc network [J]. Application Research ofComputers, 2008, 25(6): 1779-1782.[8]Luo H Y.[J].Zerfos P, and Kong J, et al.. Self-securing Ad hocNetworks[C]. Proc of the Seventh IEEE Symposium onComputers and Communications (ISCC02). IEEEComputer Society.2002,:-[9]Shamir A. How to share a secret [J]. Communications of theACM, 1979, 22(11): 6l2-6l3.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3222) PDF downloads(782) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return