预览加载中,请您耐心等待几秒...
1/2
2/2

在线预览结束,喜欢就下载吧,查找使用更方便

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

AdHoc网络中的群组密钥协商协议研究的中期报告 Abstract: Adhocnetworkshavebeenwidelyusedinvariousfields,suchasmilitary,disasterrelief,andpublicsecurity,duetotheirflexibility,self-organizing,andself-configuringcharacteristics.Inthesescenarios,itisoftennecessarytoestablishsecurecommunicationbetweenagroupofnodeswithasharedkey.Groupkeyagreement(GKA)protocolsareusedtoachievethisgoalwithoutrelyingonpre-existinginfrastructureorcentralizedauthorities.Inthismidtermreport,wereviewthestate-of-the-artGKAprotocolsforadhocnetworks,classifythembasedontheirproperties,andcomparetheirperformanceintermsofsecurity,communicationandcomputationoverheads. Introduction: Adhocnetworksarewirelessnetworkswithoutafixedinfrastructure,nodescancommunicatewitheachotherdirectlyorindirectly.Adhocnetworksarebecomingincreasinglyimportantinvariousfields,suchasmilitary,disasterrelief,andpublicsecurity.Duetotheabsenceofpre-existinginfrastructureorcentralizedauthorities,securecommunicationbetweennodesinadhocnetworksischallenging.Groupkeyagreement(GKA)protocolsareusedtoestablishasharedkeyamongagroupofnodesforsecurecommunication.GKAprotocolsareclassifiedintotwocategories,centralisedanddecentralised.Centralisedprotocolsrequireatrustedcentralauthority,whiledecentralisedprotocolsdonotrelyonanysuchauthority.Inthismidtermreport,wemainlyfocusondecentralisedGKAprotocols. State-of-the-art: DecentralisedGKAprotocolsforadhocnetworkscanbefurtherclassifiedintothreecategories:identity-based,certificate-based,andthreshold-basedprotocols.Identity-basedprotocolsusenodes'identitiestoestablishasharedkey.Certificate-basedprotocolsrequirenodestoholdacertificateissuedbyatrustedauthoritytoprovetheiridentity.Threshold-basedprotocolsrequireasubsetofnodestojointlycomputeasharedkey.Alotofresearchhasbeendoneinthisarea,andsomeofthecommonlyusedprotocolsincludetheTGDH,FTE,andAKYprotocols. Comparison: DifferentGKAprotocolshavedifferentpropertiesandperformanceintermsofsecurity,communication,andcomputationoverhead.TGDHisacertificate-basedprotocolwithlowcommunica