首页 | 本学科首页   官方微博 | 高级检索  
     检索      

SLID: A Secure Lowest-ID Clustering Algorithm
作者姓名:HUGuang-ming  HUANGZun-guo  HUHua-ping  GONGZheng-hu
作者单位:SchoolofComputerScience,NationalUniversityofDefenseTechnology,Changsha410073,Hunan,China
基金项目:Supported by the National High Technology Re search and Development Program of China (2003AA142080)
摘    要:In order to solve security problem of clustering algorithm, we proposed a method to enhance the security of the well-known lowest-ID clustering algorithm. This method is based on the idea of the secret sharing and the (k, n) threshold cryptography. Each node, whether clusterhead or ordinary member, holds ?a share of the global certificate, and any k nodes can communicate securely. There is no need for any clusterhead to execute extra functions more than routing. Our scheme needs ,some prior configuration before deployment, and can be used in critical environment with small scale. The security-enhancement for Lowest-ID algorithm can also be applied into other clustering approaches with minor modification. The feasibility of this method was verified by the simulation results.

关 键 词:聚类算法  密码分配  阈值密码系统  标识符  计算机网络  网络安全
收稿时间:15 May 2004

SLID: A secure lowest-ID clustering algorithm
HUGuang-ming HUANGZun-guo HUHua-ping GONGZheng-hu.SLID: A secure lowest-ID clustering algorithm[J].Wuhan University Journal of Natural Sciences,2005,10(1):39-42.
Authors:Hu Guang-ming  Huang Zun-guo  Hu Hua-ping  Gong Zheng-hu
Institution:(1) School of Computer Science, National University of Defense Technology, 410073, Human Changsha, China
Abstract:In order to solve security problem of clustering algorithm, we proposed a method to enhance the security of the well-known lowest-ID clustering algorithm. This method is based on the idea of the secret sharing and the (k,n) threshold cryptography. Each node, whether clusterhead or ordinary member, holds a share of the global certificate, and any k nodes can communicate securely. There is no need for any clusterhead to execute extra functions more than routing. Our scheme needs some prior configuration before deployment, and can be used in critical environment with small scale. The security-enhancement for Lowest-ID algorithm can also be applied into other clustering approaches with minor modification. The feasibility of this method was verified by the simulation results.
Keywords:clustering algorithm  secret sharing  threshold cryptography
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号