Signcryption-Based Key Management for MANETs Applications in Mobile Commerce

来源 :Wuhan University Journal of Natural Sciences | 被引量 : 0次 | 上传用户:wanily1123
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management. Mobile commerce uses wireless device and wireless link to result in the transfer of values ​​in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Therefore, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly reduces the computation and storage costs of mobile hosts, as well as communicati on cost for system key management.
其他文献
新年要有新气象,学问更要新眼光。不久前,我所午餐学术沙龙举办了一个很好的学术活动,主题是讨论:“谷歌事件与中国”。我在开场白的发言中提出了三点引导性要求:一是不要只就谷歌谈谷歌,要多挖周边和幕后的东西;二是要以中美关系大局看谷歌事件,奥巴马、希拉里等政府高官均力推谷歌,究竟说明了什么问题;
<正> 一、我国经济地理学中的区位论在近代经济地理学中,对于事物地理分布的根本模式有两种看法,也就是两种地理空间观。它们之间最明显的区别在于是否承认不同事物的分布可以交叉。其中一种是“区域传统”。它认为地理空间表现为许多形态不同的“区域”;每个区域以内的全部事物自成一体,并且只属于本区;因此各个区域在分布上不相交叉,各有排他性的边界。这种观点承认了地理空间的两种表现之一,即不同坐落的事物具有不同形态。
在竞争激烈的今天,每个人都有压力,越来越多的人感到疲惫不堪,尤其是IT企业员工工作、生活等压力与日剧增,压力管理已成为企业管理刻不容缓的工作。本文分析了IT企业员工压力
近年来,我国移动通信和互联网成为增长最快的两大产业。随着新技术的迅猛发展和人们需求的不断增强,移动互联网的产生成为一种必然的趋势,这个新兴的产业给传统电信业务增长
请下载后查看,本文暂不支持在线获取查看简介。 Please download to view, this article does not support online access to view profile.
期刊
2007年3月29日,德国海军第3艘K130型轻型护卫舰“爱尔福特”号在北海造船厂建成下水。K130型是德国海军在建的最新轻护舰,是德国根据冷战后世界战略格局的变化和德国海军新的
有人说:“人生要么旅行,要么读书,身体和灵魂,必须有一个要在路上。”明朝大旅行家徐霞客的旅行似乎是他的人生使命,但他不为游山玩水,只为寻找真相。滇西之行意义非凡徐霞客
1967年,越南战争全面爆发,美军陷入了二战后最大的战争泥潭。在这次战争中,代表着东西方完全不同设计思路的两种当今世界最著名的突击步枪,苏联的AK47与美国的M16首次在战场
列宁的经济思想是马克思主义理论宝库中的重要组成部分。他的经济思想,虽然没有构成完整的理论体系,但不乏对马克思主义经济理论的发展与贡献。特别是他晚年的经济思想尽管
区域综合开发包括发展战略,规划和计划等方面研究和任务,这些带有任务性质的研究,习惯上主要据经验进行区域实践研究,也发展一些相应的定量计算方法,与此同时,定性的理论分析