• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
FU Ying-fang, HE Jing-sha, LUAN Liang-yu, WANG Rong, LI Guo-rui. A Distributed Key Management Scheme for Wireless Mesh Networks[J]. Journal of Beijing University of Technology, 2009, 35(3): 403-408.
Citation: FU Ying-fang, HE Jing-sha, LUAN Liang-yu, WANG Rong, LI Guo-rui. A Distributed Key Management Scheme for Wireless Mesh Networks[J]. Journal of Beijing University of Technology, 2009, 35(3): 403-408.

A Distributed Key Management Scheme for Wireless Mesh Networks

More Information
  • Received Date: October 30, 2007
  • Available Online: December 06, 2022
  • In order to design a key distribution scheme with security,expandability,validity,fault tolerance and usability for the wireless mesh networks,the authors present a key distribution scheme using a combination of techniques,such as zone-based network topology structure,virtual CA(Certification Authority),offline CA,threshold structure and identity-based cryptosystem.The author also analyzes the performance of the key distribution scheme in theory and simulates the key distribution for the backbone network with OPNET software.The following conclusions are drawn:The variation of the key distribution delay in the best condition of the different scales is between 0.4 s and 0.7 s,and the most key distribution delay is about 0.5 s;Under the worst condition,the key distribution delay increases gradually,and the variation of key distribution delay is between 0.4 s and 4.8 s;The average key distribution delay is 0.564 2 s; The successful rate of the key distribution is a percentage of 100 when the number of the backbone router is less than 30,and the successful rate of the key distribution is a percentage of 94 when the number of the backbone router is 32.
  • [1]
    方旭民.下一代无线因特网技术:无线Mesh网络[M].北京:人民邮电出版社,2006.
    [2]
    SALEM N,HUBAUX J.Securing wireless mesh networks[J].IEEE Wireless Communications,2006,13(2):50-55.
    [3]
    Group of the LAN/MAN Committee.IEEE draft amendment to standard for information technology-telecommunications and information exchange between systems-LAN/MAN specific requirements-part 11:wireless medium access control(MAC)and physical layer(PHY)specifications:amendment:ESS mesh networking,IEEE 802.11s/D1.0[EB/OL].[2007-03-10]. http://ieeexplore.ieee.org/Xplore/defdeny.jsp?url=/ielD/4278905/4278906/04278907.pdf.
    [4]
    KHALILI A,KATZ J,ARBAUGH W A.Toward secure key distribution in truly Ad-Hoc networks[C]//Soc JAPAN. Symposium on Applications and the Internet Workshops.Florida,USA:IEEE Computer Soc,2003:342-346.
    [5]
    SHAMIR A.How to share a secret[J].CACM,1979,24(11):612-613.
    [6]
    龙华.OPNET Modeler与计算机网络仿真[M].西安:西安电子科技大学出版社,2006.
    [7]
    陈敏.OPNET网络仿真[M].北京:清华大学出版社,2004.
    [8]
    李馨,叶明.OPNET Modeler网络建模与仿真[M].西安:西安电子科技大学出版社,2005.
  • Related Articles

    [1]WU Zhijun, NIU Fangchao, PAN Deng, LEI Jin. Authority for SWIM Based on Attribute Encryption[J]. Journal of Beijing University of Technology, 2017, 43(3): 350-357. DOI: 10.11936/bjutxb2015090051
    [2]YE Shaozhen, CHEN Liqing. Searchable Attribute-based Encryption Access Control Scheme[J]. Journal of Beijing University of Technology, 2016, 42(8): 1160-1166. DOI: 10.11936/bjutxb2015080017
    [3]ZHOU Dawei, WEI Guoheng, ZHANG Huanguo. Key-management Scheme Based on Public-key Institution to Clustered Wireless Sensor Networks[J]. Journal of Beijing University of Technology, 2016, 42(5): 707-712. DOI: 10.11936/bjutxb2015070081
    [4]HAN Lei, LIU Ji-qiang, WEI Xue-ye, HOU Jie. Application Research on Key Management of Ad Hoc Network Based on PTPM[J]. Journal of Beijing University of Technology, 2012, 38(11): 1676-1682.
    [5]ZHANG Han, ZHANG Jian-biao, ZHANG Tao. Certificate Distribution Deposition Model Based on DHT Network[J]. Journal of Beijing University of Technology, 2012, 38(3): 385-389.
    [6]HU Jin, HE De-biao, CHEN Jian-hua, HUANG Yin. Public-key Cryptosystem Based on Elliptic Curve Isogenies[J]. Journal of Beijing University of Technology, 2011, 37(6): 916-920.
    [7]SHI Wei-min. Enhanced Identity-based Deniable Authentication Protocol[J]. Journal of Beijing University of Technology, 2011, 37(3): 477-480.
    [8]ZHAN Yang, TIAN Hai-bo, CHEN Xiao-feng, WANG Yu-min. ID-based Chameleon Hash Scheme and Signature Without Key Escrow[J]. Journal of Beijing University of Technology, 2010, 36(5): 685-688.
    [9]SHI Wei-min. An Improved Scheme of LeeB Secure Key Issuing Protocol[J]. Journal of Beijing University of Technology, 2010, 36(3): 401-404.
    [10]CAI Yong-quan, XIAO Chuang-bo. Security Frame of Private Key Certificate Based on Attribute and Its Realization[J]. Journal of Beijing University of Technology, 2004, 30(1): 68-70.

Catalog

    Article views (11) PDF downloads (7) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return