一种自组织无线网络中的分层访问控制方案

C. Hernández-Goya, P. Caballero-Gil
{"title":"一种自组织无线网络中的分层访问控制方案","authors":"C. Hernández-Goya, P. Caballero-Gil","doi":"10.1109/CCST.2005.1594870","DOIUrl":null,"url":null,"abstract":"The restrictions of resources present in the environment of mobile ad hoc networks (MANETs) have forced the adaptation of the existing tools for guaranteeing security basic services in this new framework. The set of restrictions associated to computational, communication and power supply resources is the main barrier when providing them with security mechanisms. The solutions outlined so far for authentication based on classical tools have result non satisfactory for this setting. That is why examining the possibility of using advanced protocols should be explored. Following this trend, a new authentication protocol specifically designed for this setting is proposed in this work. A hard on average problem and an NP-complete one, belonging both to graph theory, are combined in order to design simultaneously an admission control protocol (ACP) and a node authentication protocol (NAP) using identification schemes belonging to the set of zero-knowledge interactive proofs (ZKIP). Using this technique is a way to avoid the nuisances derived from the utilization of PKT.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A hierarchical access control scheme in ad-hoc wireless networks\",\"authors\":\"C. Hernández-Goya, P. Caballero-Gil\",\"doi\":\"10.1109/CCST.2005.1594870\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The restrictions of resources present in the environment of mobile ad hoc networks (MANETs) have forced the adaptation of the existing tools for guaranteeing security basic services in this new framework. The set of restrictions associated to computational, communication and power supply resources is the main barrier when providing them with security mechanisms. The solutions outlined so far for authentication based on classical tools have result non satisfactory for this setting. That is why examining the possibility of using advanced protocols should be explored. Following this trend, a new authentication protocol specifically designed for this setting is proposed in this work. A hard on average problem and an NP-complete one, belonging both to graph theory, are combined in order to design simultaneously an admission control protocol (ACP) and a node authentication protocol (NAP) using identification schemes belonging to the set of zero-knowledge interactive proofs (ZKIP). Using this technique is a way to avoid the nuisances derived from the utilization of PKT.\",\"PeriodicalId\":411051,\"journal\":{\"name\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2005.1594870\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594870","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

移动自组织网络(manet)环境中存在的资源限制迫使现有工具在这个新框架中进行调整,以保证安全基本服务。与计算、通信和电源资源相关的一组限制是为它们提供安全机制时的主要障碍。迄今为止概述的基于经典工具的身份验证解决方案的结果不能满足这种设置。这就是为什么应该探讨使用先进协议的可能性。遵循这一趋势,本文提出了专门为此设置设计的新的身份验证协议。结合图论中的一个平均难问题和一个np完全问题,利用属于零知识交互证明集(ZKIP)的识别方案,同时设计了一个接纳控制协议(ACP)和一个节点认证协议(NAP)。使用这种技术可以避免使用PKT带来的麻烦。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A hierarchical access control scheme in ad-hoc wireless networks
The restrictions of resources present in the environment of mobile ad hoc networks (MANETs) have forced the adaptation of the existing tools for guaranteeing security basic services in this new framework. The set of restrictions associated to computational, communication and power supply resources is the main barrier when providing them with security mechanisms. The solutions outlined so far for authentication based on classical tools have result non satisfactory for this setting. That is why examining the possibility of using advanced protocols should be explored. Following this trend, a new authentication protocol specifically designed for this setting is proposed in this work. A hard on average problem and an NP-complete one, belonging both to graph theory, are combined in order to design simultaneously an admission control protocol (ACP) and a node authentication protocol (NAP) using identification schemes belonging to the set of zero-knowledge interactive proofs (ZKIP). Using this technique is a way to avoid the nuisances derived from the utilization of PKT.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信