检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:杨波[1] 洪威 YANG Bo;HONG Wei(Changzhou University,Changzhou Jiangsu 213159,China)
机构地区:[1]常州大学,江苏常州213159
出 处:《计算机仿真》2024年第4期296-300,共5页Computer Simulation
摘 要:密钥在多个安全域之间传输时,会面临窃听、中间人攻击等多种安全风险。为了保障网络信息的安全传输,提出一种无线局域网多安全域间的密钥异地共享方法。基于局域网跨域访问形式的分析,结合云计算方法与信任机制概念,对跨域访问申请者的访问可信期望值展开计算,实现用户跨域访问行为的危险性判断。引入密钥共享策略,对重要信息展开初始化处理、子密钥生成、许可凭证生成以及密钥重构四个阶段的相关操作;在完成信息加密处理的同时,对信息共享群组内成员实施重组密钥分发,进而实现群组成员密钥的异地共享。实验证明,利用所提方法对重要信息展开加密处理后,信息的隐藏程度高,且具备优秀的抗攻击能力,对信息的存储及传输安全具有重大意义。To ensure the secure transmission of network information,this article put forward a key sharing method across multiple security domains in WLAN.Firstly,based on the analysis of cross-domain access forms in LAN,as well as cloud computing method and trust mechanism,the expected value of access credibility for cross-domain access applicants was calculated to achieve the risk assessment of user’s cross-domain access behaviors.Secondly,a key sharing strategy was introduced to initialize the important information,generate subkeys and permission certificates,and reconstruct keys.Moreover,the key recombination and distribution among group members were implemented,while completing the encryption of information.Finally,we achieved the remote key sharing among group members.The experiment results prove that after the important information encrypted by the proposed method,the information hiding level is higher in addition,the method has excellent anti-attack capability,which is of great significance for the storage and transmission security of information.
分 类 号:TP309.2[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.90