ID |
原文 |
译文 |
44396 |
由于网络节点频繁地加入、离开,导致网络拓扑结构动态变化,因此需要设计一种高效的密钥管理方案。 |
Due to the frequent changes and changes in the network topology caused by the frequent joining and leaving of network nodes, it is necessary to design an efficient key management scheme. |
44397 |
提出一种基于 ECC 的分层密钥管理(EC-HKM,ECC based hie-rarchical key management)方案,该方案基于椭圆曲线上离散对数难问题,网络中每个节点都可以通过自己的私钥计算出子节点的密钥,达到分层访问控制的目标。 |
An ECC based hierarchical key management (EC-HKM) scheme based on the elliptic curve discrete logarithm problem (ECDLP) was proposed. Each node in the network can calculate the decryption key of the child nodes through its own private key to achieve hierarchical access control goals. |
44398 |
方案包括系统建立、密钥更新、节点加入、删除等部分,同时给出方案的安全性和复杂度分析。 |
The proposed scheme consists of system initialization,key updating, node join and revoke, etc., and gives the security and complexity analysis of the scheme. |
44399 |
面对现在复杂多变的安全需求,需要针对网络攻击不同阶段的特征搭建多层次的安全防御体系架构。 |
Facing these severe information security circumstances, it's imperative to research on dynamic security defending technique of various techniques combined. |
44400 |
首先,基于网络攻击的具体流程对现有网络攻击技术和主动安全防御技术进行了相应研究。 |
Firstly, the research on the whole process of network attack and existing active security defending techniques was given and implemented. |
44401 |
其次,提出了基于Netfilter 和容器技术的动态迁移伪装策略。 |
Secondly, a dynamic flow lead and service camouflage technique was proposed based on Netfilter and container technology. |
44402 |
最后,根据系统的整体设计架构和各模块关键技术,基于 Netfilter/Iptables 框架和容器等基础技术实现并部署了多层次的动态安全防御系统。 |
Finally, according to the system architecture and key techniques above, the dynamic security defending system has been implemented and deployed on the basis of the underlying techniques. |
44403 |
对 Aminet 等提出的无线传感器网络环境下匿名认证协议进行了安全分析,指出此协议不能抵抗移动设备丢失攻击、用户冒充攻击及传感器节点捕获攻击。 |
Analyse an anonymous patient monitoring system using wireless medical sensor networks proposed by Aminet al.'s scheme, we find that the scheme cannot resist mobile device loss attack, user impersonation attack and node capture attack. |
44404 |
基于口令和智能卡这 2 个认证因素,增加生物特征标识作为附加安全因素,设计了一个三因素无线传感器认证密钥协商方案。 |
Taking as the smart card and password are basic secure factors and biometric information is an additional secure factor. We propose a three-factor authentication and key agreement scheme for wireless sensor networks. |
44405 |
利用 BAN 逻辑和启发式分析证明了方案的安全性,通过与其他相关协议比较,改进协议计算量相对比较低,且实现了所有安全属性,适应实际的应用。 |
The proposed scheme is proved to be secure via Burrows-Abadi-Needham(BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed that our proposed scheme not only achieves all security property, but also has lower the computing of the proposed scheme is relatively low. So, it is suitable for practical application. |