• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于信道特性的无线自组织网络多跳密钥协商方案。

A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

作者信息

Hao Zhuo, Zhong Sheng, Yu Nenghai

机构信息

MicroStrategy, Hangzhou, China.

出版信息

ScientificWorldJournal. 2013 May 20;2013:935604. doi: 10.1155/2013/935604. Print 2013.

DOI:10.1155/2013/935604
PMID:23766725
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC3673334/
Abstract

A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

摘要

最近已经提出了许多基于无线信道特性的密钥协商方案。然而,先前的密钥协商方案要求需要就密钥达成一致的两个节点彼此在通信范围内。因此,它们不适用于多跳无线网络,在这种网络中节点并不总是相互直接连接。在本文中,我们首先为无线自组织网络提出了一种基本的多跳密钥协商方案。所提出的基本方案能够抵御外部窃听者。然而,当存在内部窃听者或中间人(MITM)对手时,这个基本方案并不安全。为了应对这些对手,我们提出了一种改进的多跳密钥协商方案。我们表明,改进后的方案在单一路径上对内部窃听者和MITM对手是安全的。性能分析和仿真结果都表明改进后的方案是高效的。因此,改进后的密钥协商方案适用于多跳无线自组织网络。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/369d76be6aaf/TSWJ2013-935604.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/5d6beb1c59c2/TSWJ2013-935604.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/8f476ee02469/TSWJ2013-935604.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/6e22484cc7f8/TSWJ2013-935604.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/3131d08e4a97/TSWJ2013-935604.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/8272eceac8fe/TSWJ2013-935604.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/0852d4519b10/TSWJ2013-935604.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/0ca92cb8ac1a/TSWJ2013-935604.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/a2a2e3573b01/TSWJ2013-935604.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/369d76be6aaf/TSWJ2013-935604.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/5d6beb1c59c2/TSWJ2013-935604.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/8f476ee02469/TSWJ2013-935604.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/6e22484cc7f8/TSWJ2013-935604.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/3131d08e4a97/TSWJ2013-935604.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/8272eceac8fe/TSWJ2013-935604.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/0852d4519b10/TSWJ2013-935604.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/0ca92cb8ac1a/TSWJ2013-935604.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/a2a2e3573b01/TSWJ2013-935604.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/79af/3673334/369d76be6aaf/TSWJ2013-935604.009.jpg

相似文献

1
A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.一种基于信道特性的无线自组织网络多跳密钥协商方案。
ScientificWorldJournal. 2013 May 20;2013:935604. doi: 10.1155/2013/935604. Print 2013.
2
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.一种基于先进时间凭证的安全方案,具有无线传感器网络中的相互认证和密钥协商功能。
Sensors (Basel). 2013 Jul 24;13(8):9589-603. doi: 10.3390/s130809589.
3
A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.802.11s 无线 mesh 网络路由协议及其安全路由协议的安全性分析。
Sensors (Basel). 2013 Sep 2;13(9):11553-85. doi: 10.3390/s130911553.
4
A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.一种用于无线体域网的基于广播且使用集合协调的密钥协商方案。
J Med Syst. 2014 May;38(5):33. doi: 10.1007/s10916-014-0033-1. Epub 2014 Apr 18.
5
Enhancement of the performance of wireless sensor networks using the multihop multiantenna power beacon path selection method in intelligent structures.利用多跳多天线功率信标路径选择方法增强智能结构中的无线传感器网络性能。
PLoS One. 2022 Nov 7;17(11):e0276940. doi: 10.1371/journal.pone.0276940. eCollection 2022.
6
Design and analysis of a dynamic mobility management scheme for wireless mesh network.无线网状网络动态移动性管理方案的设计与分析
ScientificWorldJournal. 2013 Nov 7;2013:656259. doi: 10.1155/2013/656259. eCollection 2013.
7
Secure SCADA communication by using a modified key management scheme.采用经过修改的密钥管理方案来确保 SCADA 通信的安全性。
ISA Trans. 2013 Jul;52(4):517-24. doi: 10.1016/j.isatra.2013.02.005. Epub 2013 Mar 22.
8
Adaptive multi-node multiple input and multiple output (MIMO) transmission for mobile wireless multimedia sensor networks.移动无线多媒体传感器网络中的自适应多节点多输入多输出 (MIMO) 传输。
Sensors (Basel). 2013 Oct 2;13(10):13382-401. doi: 10.3390/s131013382.
9
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.无线传感器网络中使用动态身份的增强型双因素认证和密钥协商
Sensors (Basel). 2015 Nov 30;15(12):29841-54. doi: 10.3390/s151229767.
10
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.无线传感器网络中的安全高效三因子协议
Sensors (Basel). 2018 Dec 18;18(12):4481. doi: 10.3390/s18124481.