期刊文献+

SLID: A Secure Lowest-ID Clustering Algorithm 被引量:2

SLID: A Secure Lowest-ID Clustering Algorithm
在线阅读 下载PDF
导出
摘要 In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results. In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期39-42,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National High Technology Re search and Development Program of China (2003AA142080)
关键词 clustering algorithm secret sharing threshold cryptography clustering algorithm secret sharing threshold cryptography
  • 相关文献

参考文献6

  • 1Mainak Chatterjee,Sajal K. Das,Damla Turgut.WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks[J].Cluster Computing.2002(2)
  • 2Mario Gerla,Jack Tzu-Chieh Tsai.Multicluster, mobile, multimedia radio network[J].Wireless Networks.1995(3)
  • 3Capkun S,Buttyan L,Hubaux J P.Self-Organized Publickey Management for Mobile Ad Hoc Networks[].IEEE Transactions on Mobile Computing.2003
  • 4Zhou L,Haas Z J.Securing Ad Hoc Networks[].IEEE Network.1999
  • 5Gerla M,Tsai Tzu-chieh.Multicluster Mobile, Multimedia Radio Network[].Wireless Networks.1995
  • 6Shamir A.How to Share a Secret[].ACM Comm.1979

同被引文献27

  • 1胡光明,蒋杰,龚正虎.移动自组网络分簇算法综述[J].计算机工程与科学,2005,27(1):48-50. 被引量:16
  • 2WANGXiao-yun,YANGLi-zhen,CHENKe-fei.SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks[J].Wuhan University Journal of Natural Sciences,2005,10(1):127-131. 被引量:12
  • 3Dragos Niculescu, Badri Nath. Ad hoc positioning system (aps) using aoa[C]. In: Proc. of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), San Francisco, CA, 2003.
  • 4Chintalapudi K, Dhariwal A, Govindan R, et al. Localization using ranging and sectoring[C]. In: Proc. of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004), Hong Kong, HK, 2004.
  • 5Imrich Chlamtac, Marco Conti, Jennifer J-N Liu. Mobile ad hoc networking: imperatives and challenges[J]. Ad-Hoc Networks Journal (Inaugural Issue), 2003,1(1) :13-64.
  • 6Kawadia V, Kumar P R. Power control and clustering in ad hoe networks[C]. In: Proc. of Infocom,2003.
  • 7Stefano Basagni. Distributed clustering for ad hoc networks [C]. In: Proceedings of the IEEE International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), June 1999, 310-315.
  • 8Lidong Zhou, Zygmunt J Haas. Securing ad hoe networks[J]. IEEE Network Magazine, 1999,13 (6): 24 - 30.
  • 9Hu F, Sharma N K. Security considerations in ad hoe sensor networks[J]. Ad Hoe Networks, 2005,3(1) :69-89.
  • 10Gerla M, Tsai J T C. Muhicluster, mobile, multimedia radio network [J]. ACM-Bahzer Journal of Wireless Networks, 1995, 1(3): 255-265.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部