CN106230582B - Random routing method in quantum secret communication network - Google Patents

Random routing method in quantum secret communication network Download PDF

Info

Publication number
CN106230582B
CN106230582B CN201610561463.4A CN201610561463A CN106230582B CN 106230582 B CN106230582 B CN 106230582B CN 201610561463 A CN201610561463 A CN 201610561463A CN 106230582 B CN106230582 B CN 106230582B
Authority
CN
China
Prior art keywords
quantum
key
router
hop
adjacent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610561463.4A
Other languages
Chinese (zh)
Other versions
CN106230582A (en
Inventor
权东晓
李敏
朱畅华
陈南
易运晖
何先灯
赵楠
裴昌幸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201610561463.4A priority Critical patent/CN106230582B/en
Publication of CN106230582A publication Critical patent/CN106230582A/en
Application granted granted Critical
Publication of CN106230582B publication Critical patent/CN106230582B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/54Organization of routing tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses the random routing methods in a kind of quantum secret communication network, mainly solve the problems, such as communication key in the prior art negotiation path uniquely and path predictability height and caused by key safety it is low.Its technical solution is: extend routing table by improving routing algorithm based on distance vector, be added to multiple next-hops to reach the quantum router of a certain destination address, and then obtain source quantum router to purpose quantum router a plurality of shortest path;The size of key of chain road is taken into account simultaneously, in the case where next-hop routing node enough there are multiple size of keys, forward communication key with being randomly chosen a next-hop hop-by-hop wherein, communication key is forwarded to purpose quantum router always, to realize random progress of the key agreement on mulitpath.The present invention reduces key consumption, improve the safety of key in cipher key agreement process, can be used for quantum secret communication network.

Description

Random routing method in quantum secret communication network
Technical field
The invention belongs to fields of communication technology, relate in particular to a kind of random routing method, and it is logical to can be used for quantum secure Communication network.
Background technique
Currently, Heisenberg's uncertainty principle, principle of state superposition, the monochromatic light applied in quantum secret communication network The quantum-mechanical basic principle such as sub- uncertainty principle and the unclonable theorem of quantum state ensure that quantum communications in physical principle On Unconditional security, therefore, quantum communications have obtained extensive attention, and achieve quick development, from theory Move towards experiment, and gradually commercialization.Quantum communications branch is numerous, and obtain commercialization earliest is quantum key distribution technology, communication Both sides can negotiate the key being perfectly safe by quantum key distribution, and with this encrypted data, abampere may be implemented Full communication.However current research is mainly in point-to-point quantum key distribution, it is close to multi-user, large-scale quantum Key distribution network research is very few.With the continuous expansion of quantum key distribution Experimental Network scale, more and more researchers by Gradually pay close attention to the research of quantum secret communication network.
The key agreement between arbitrary node may be implemented in quantum secret communication network, leads to end to end between any two user The link key that letter key can be obtained by each point-to-point link by quantum key distribution carries out relay transmission and sets up.By Big in network size, node is more, when carrying out end-to-end key agreement, it is understood that there may be the path of a plurality of transmission key, path is not With the safety that will directly influence the consumption of key and key in network.Therefore, the routing side in quantum secret communication network Method using most important.
2015, stone is of heap of stone to be waited in periodical " computer application " 35 (12) 3336-3340 pages of " quantum key distribution of publishing an article Network-side end key agreement optimal route selection algorithm ", it proposes a kind of based on the end-to-end key for improving dijkstra's algorithm Negotiate optimal route selection algorithm.The algorithm first selects all links that chain road size of key is greater than key applications, a plurality of point Link to point constitutes a paths, recycles improved dijkstra's algorithm to carry out Shortest Path Searching, is finally searching for To a plurality of shortest path in one each link key amount of selection than forming big optimal of each link key amount in other paths Path.But the path that this method finally obtains is unique, the situation as known in the topology and link key amount of network Under, the intermediate node on path be it is predictable, in a network exist eavesdropping in the case where, listener-in is easy to predict centre Node is eavesdropped, and the safety of key is influenced.Therefore, it is necessary to further develop one in quantum secret communication network The safer method for routing of kind.
Summary of the invention
The purpose of the present invention is to provide a kind of random routing methods of key agreement in quantum secret communication network, to change Method for routing into existing quantum secret communication network reduces the consumption of key, improves the safety of network.
Basic ideas of the invention are, in quantum secret communication network, to be communicated, then needed between quantum terminal The quantum router being connected with terminal negotiates communication key end to end.The negotiation of end-to-end communication key requires adjacent first Key agreement is carried out using quantum key distribution agreement between quantum router, negotiates the quantum key between neighbouring device, so Final communication key end to end is set up by certain key method for routing afterwards.
According to above-mentioned thinking, realization step of the invention includes the following:
(1) routing table of extension is obtained:
Quantum router receives the routing update information of all adjacent quantum routers, and sends to adjacent quantum router Routing update information in comprising already existing destination address in local routing table, and the adjacent quantum router not conduct These information that next-hop is present in local routing table are judged:
If the hop count that the adjacent quantum router reaches this destination address add after a jump with the jump in local routing table Number is unequal, then gives up these routing update informations;
If the hop count that the adjacent quantum router reaches this destination address add after a jump with the jump in local routing table Number is equal, then is added in local routing table using this adjacent quantum router as next-hop, the quantum router arrives at this time There are multiple next-hops for a certain destination address, the routing table after being extended;
(2) adjacent quantum router goes out quantum key K using quantum key distribution protocol negotiation, and stores;
(3) quantum communications terminal in source is attached foundation with purpose quantum communications terminal to communicate, source quantum router will This time the communication key Kc of communication is sent to purpose quantum router;
(4) source quantum router searches itself routing table according to this destination address negotiated, and negotiates in utilization (2) Quantum key K is encrypted and is forwarded to communication key Kc:
(4a) judges to then follow the steps to the next-hop number N of this destination address negotiated if N=1 in routing table (4b) thens follow the steps (4c) if N > 1;
(4b) judges whether the bit number of the quantum key K stored in the adjacent quantum router of next-hop is greater than communication key The bit number of Kc, if so, executed the adjacent quantum router of next-hop is forwarded to after communication key Kc encryption step (4d), it is no Then, this time key agreement fails for notice source quantum communications terminal and purpose quantum communications terminal, executes step (5);
The bit number that (4c) filters out quantum key K in the adjacent quantum router of N number of next-hop is greater than communication key Kc Bit number quantum router, and wherein randomly choose one, will communication key Kc encryption after be forwarded to the adjacent amount Sub-router executes step (4d);The bit number of the quantum key K stored in quantum router adjacent for multiple next-hops is equal Less than the bit number of communication key Kc, then notify source quantum communications terminal and purpose quantum communications terminal that this time key agreement loses It loses, executes step (5);
(4d) adjacent quantum router receives encrypted communication key, is solved using the quantum key K of storage to it It is close, and judge whether current quantum router is purpose quantum router, if so, source quantum router and purpose quantum route Communication key Kc is successfully established device end to end, and source quantum router transmits data encryption using communication key Kc, And step (3), (4) are repeated, until sign off, executes step (5), otherwise, routing table is searched according to destination address, is returned (4a);
(5) connection of source of release quantum communications terminal and purpose quantum communications terminal room.
Compared with prior art, the present invention having the advantage that
The first, the present invention obtains communicating in quantum secret communication network close by the traditional Distance Vector Routing Algorithm of improvement The negotiation path of key, to realize in quantum secret communication network the shared of end-to-end key between arbitrary node.With existing skill Art is compared, and negotiation path is most short, is reduced the consumption of key in cipher key agreement process, is improved the efficiency of service of key.
The second, method for routing of the present invention extends the routing table of quantum router, source quantum router to purpose quantum road By device there are multiple next-hops, make the path of key agreement there are a plurality of, and introduces the think of of randomization in routing process Think, overcomes negotiation path in the prior art and only have one and the high deficiency of path predictability, key agreement is on a plurality of road It is carried out at random on diameter, improves the unpredictability of intermediate node, increased the attack difficulty of attacker, enhance the peace of key Quan Xing.
Detailed description of the invention
Fig. 1 is implementation flow chart of the invention.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawing.
Referring to Fig.1, random routing method of the invention includes the following steps:
Step 1, the routing table of quantum router is extended.
It is existing based on the routing algorithm of distance vector certain quantum router update routing table when, reach a certain destination address A next-hop is only added, therefore in the routing table, quantum router only exists unique next-hop to purpose quantum router, That is there was only one in the path of source quantum router to purpose quantum router.
Present invention improves over traditional routing algorithms, when quantum router updates routing table, according to distance vector algorithm Multiple next-hops that the quantum router reaches other all quantum routers are obtained, i.e., are connected directly with the quantum router Quantum router.Specific method is:
After the routing update information that quantum router receives that adjacent quantum router is sent, adjacent quantum router is sent out Comprising already existing destination address in local routing table in the routing update information come, and the adjacent quantum router is not made These information being present in local routing table for next-hop are judged:
If the hop count that the adjacent quantum router reaches this destination address add after a jump with the jump in local routing table Number is unequal, then gives up these routing update informations;
If the hop count that the adjacent quantum router reaches this destination address add after a jump with the jump in local routing table Number is equal, then is added in local routing table using this adjacent quantum router as next-hop, extends quantum router Routing table, making quantum router to a certain purpose quantum router, there are multiple next-hops, that is to say, that source quantum router arrives Purpose quantum router is there are mulitpath, each path equal length and be all shortest.
Step 2, adjacent quantum router is negotiated quantum key K and is stored.
Quantum key distribution protocol negotiation amount is used by quantum key distribution link between each adjacent quantum router Sub-key K, and the quantum key K negotiated is stored in quantum router, the quantum key K of storage is used to encrypt final End-to-end communication key Kc.
The quantum key distribution association includes the BB84 agreement that H.Bennett in 1984 and G.Brassard are realized, The B92 agreement that H.Bennett in 1992 is proposed, the E91 agreement of the design of Ekert in 1991, continuous variable quantum key distribution association View, the unrelated quantum key distribution agreement of measuring device.
Step 3, quantum communications terminal in source is established connection with purpose quantum communications terminal and is communicated.
(3a) source quantum communications terminal and purpose quantum communications terminal establish connection, and there are many connection types, such as passes Transport control protocol discusses TCP connection, User Datagram Protocol UDP connection, session initiation protocol SIP connection, at the beginning of this example uses session The connection of beginning agreement SIP;
(3b) source quantum communications terminal sends information to coupled quantum router.
Step 4, after source quantum router receives information, under passing through to the end-to-end communication key Kc of encryption of communicated data It states step and is sent to purpose quantum router:
(4a) source quantum router searches the routing table of itself according to destination address, close using the quantum stored in step 2 Key K encrypts communication key Kc, i.e., the quantum key K of storage and communication key Kc is carried out exclusive or, and by encrypted communication Key Kc is forwarded according to the following procedure, and communication key Kc is random binary Bit String;
(4a1) judges that the number N that the next-hop of the destination address is reached in quantum router is thened follow the steps if N=1 (4a2) thens follow the steps (4a3) if N > 1;
(4a2) judges whether the bit number of the quantum key K of next-hop quantum router storage is greater than communication key Kc's Bit number, if so, the quantum key K encryption communication key Kc stored with current quantum router, i.e., close the quantum of storage Key K and communication key Kc carries out exclusive or, and encrypted communication key is forwarded to next-hop quantum router, then execute step (4a4);Otherwise, this time key agreement fails for notice source quantum communications terminal and purpose communication terminal, executes step 5;
The bit number that (4a3) filters out the quantum key K of storage in N number of adjacent quantum router is greater than communication key Kc Bit number the adjacent quantum router of all next-hops, and randomly choose one wherein, current quantum router utilizes Communication key Kc is encrypted and is forwarded to the adjacent quantum router by the quantum key K of storage, and executes step (4a4);It is right The bit number of the quantum key K stored in the adjacent quantum router of multiple next-hops is respectively less than the bit number of communication key Kc, It then notifies source quantum communications terminal and purpose quantum communications terminal that this time key agreement fails, executes step 5;
(4a4) adjacent quantum router receives encrypted communication key Kc, is carried out using the quantum key K of storage to it The quantum key K of storage and the encrypted communication key received are carried out exclusive or, obtain original communication key Kc by decryption, Judge whether current quantum router is purpose quantum router further according to destination address, if so, source quantum router and mesh Quantum router between end-to-end communication key Kc be successfully established, communicated using the communication key encryption data, and Step 3,4 are repeated, until source quantum terminal and purpose quantum terminal sign off, execute step 5;If current quantum router is not It is purpose quantum router, then the quantum router continues to search routing table, return step (4a1) according to destination address;
Step 5, the connection of source of release quantum terminal and purpose quantum terminal room.

Claims (6)

1. the random routing method in quantum secret communication network, includes the following steps:
(1) routing table of extension is obtained:
Quantum router receives the routing update information of all adjacent quantum routers, and to the road that adjacent quantum router is sent By in more new information include local routing table in already existing destination address, and the adjacent quantum router be not used as it is next These information being present in local routing table are jumped to be judged:
If the hop count that the adjacent quantum router reaches this destination address adds after a jump with the hop count in local routing table not It is equal, then give up these routing update informations;
If the hop count that the adjacent quantum router reaches this destination address add after a jump with the hop count phase in local routing table Deng being then added in local routing table using this adjacent quantum router as next-hop, the quantum router is to a certain at this time There are multiple next-hops for destination address, the routing table after being extended;
(2) quantum key distribution protocol negotiation quantum is used by quantum key distribution link between each adjacent quantum router Key K, and the quantum key K negotiated is stored in quantum router;
(3) source quantum communications terminal and purpose quantum communications terminal foundation is attached to communicate, source quantum router by this The communication key Kc of communication is sent to purpose quantum router;
(4) source quantum router searches itself routing table according to this destination address negotiated, and utilizes the quantum negotiated in (2) Key K is encrypted and is forwarded to communication key Kc:
(4a) judges to then follow the steps (4b) if N=1 to the next-hop number N of this destination address negotiated in routing table, If N > 1, (4c) is thened follow the steps;
(4b) judges whether the bit number of the quantum key K stored in the adjacent quantum router of next-hop is greater than communication key Kc's Otherwise bit number, leads to if so, executing the adjacent quantum router of next-hop is forwarded to after communication key Kc encryption step (4d) Knowing source quantum communications terminal and purpose quantum communications terminal, this time key agreement fails, and executes step (5);
The bit number that (4c) filters out quantum key K in the adjacent quantum router of N number of next-hop is greater than the ratio of communication key Kc The quantum router of special number, and one is randomly chosen wherein, the adjacent quantum road will be forwarded to after communication key Kc encryption By device, execute step (4d);The bit number of the quantum key K stored in quantum router adjacent for multiple next-hops is respectively less than The bit number of communication key Kc then notifies source quantum communications terminal and purpose quantum communications terminal that this time key agreement fails, holds Row step (5);
(4d) adjacent quantum router receives encrypted communication key, it is decrypted using the quantum key K of storage, and Judge whether current quantum router is purpose quantum router, if so, source quantum router and purpose quantum router end Communication key Kc to end is successfully established, and source quantum router transmits data encryption using communication key Kc, and Step (3), (4) are repeated, until sign off, executes step (5), otherwise, routing table is searched according to destination address, is returned (4a);
(5) connection of source of release quantum communications terminal and purpose quantum communications terminal room.
2. random routing method in quantum secret communication network according to claim 1, which is characterized in that in step (1) The next-hop is the quantum router being connected directly with the quantum router.
3. random routing method in quantum secret communication network according to claim 1, which is characterized in that in step (2) The quantum key distribution agreement includes the BB84 agreement that H.Bennett in 1984 and G.Brassard are realized, and 1992 The B92 agreement that H.Bennett is proposed, E91 agreement, the continuous variable quantum key distribution agreement of the design of Ekert in 1991, measurement The unrelated quantum key distribution agreement of equipment.
4. random routing method in quantum secret communication network according to claim 1, which is characterized in that step (3), step Suddenly the communication key in (4) refers to random binary Bit String.
5. random routing method in quantum secret communication network according to claim 1, which is characterized in that step (3), step Suddenly the encryption in (4) and decryption refer to the xor operation of binary keys.
6. random routing method in quantum secret communication network according to claim 1, which is characterized in that in step (3) The connection of progress, is connected or User Datagram Protocol UDP connection or session initiation protocol SIP using transmission control protocol TCP Connection.
CN201610561463.4A 2016-07-17 2016-07-17 Random routing method in quantum secret communication network Active CN106230582B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610561463.4A CN106230582B (en) 2016-07-17 2016-07-17 Random routing method in quantum secret communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610561463.4A CN106230582B (en) 2016-07-17 2016-07-17 Random routing method in quantum secret communication network

Publications (2)

Publication Number Publication Date
CN106230582A CN106230582A (en) 2016-12-14
CN106230582B true CN106230582B (en) 2019-03-26

Family

ID=57519658

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610561463.4A Active CN106230582B (en) 2016-07-17 2016-07-17 Random routing method in quantum secret communication network

Country Status (1)

Country Link
CN (1) CN106230582B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107508671B (en) * 2017-08-18 2020-06-12 北京邮电大学 Business communication method and device based on quantum key distribution
CN108111304B (en) * 2017-12-29 2023-02-24 广东国腾量子科技有限公司 Multi-party measuring equipment irrelevant quantum key distribution network system and method
CN108270788B (en) * 2018-01-23 2020-11-10 河南理工大学 Method for constructing virtual private network based on quantum invisible state
CN110581763B (en) * 2018-06-09 2022-07-15 成都零光量子科技有限公司 Quantum key service block chain network system
CN109302285A (en) * 2018-10-25 2019-02-01 安徽问天量子科技股份有限公司 A kind of IPv6 network node data safe transmission method
CN110601974B (en) * 2019-08-05 2021-10-29 国网内蒙古东部电力有限公司信息通信分公司 Method for selecting shared protection path
CN111934856B (en) * 2020-06-24 2022-09-23 南京如般量子科技有限公司 Quantum communication method and system applied to local area network
CN113067698B (en) * 2021-02-19 2022-11-18 西安电子科技大学 Queue polling-based end-to-end key generation method in quantum metropolitan area network
CN116170368A (en) * 2021-11-25 2023-05-26 四川大学 Quantum key routing algorithm based on link contribution degree
CN117527239B (en) * 2024-01-08 2024-03-29 中国科学技术大学 Distributed routing method and system for load balancing in quantum key distribution network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490891A (en) * 2013-08-23 2014-01-01 中国科学技术大学 Method for updating and using secret key in power grid SSL VPN
CN103905180A (en) * 2014-04-21 2014-07-02 西安电子科技大学 Method for enabling classical application to have access to quantum communication network
CN105471576A (en) * 2015-12-28 2016-04-06 科大国盾量子技术股份有限公司 Quantum key relaying method, quantum terminal nodes and quantum key relaying system
CN105515766A (en) * 2015-12-16 2016-04-20 浙江神州量子网络科技有限公司 Application method of quantum key in stunnel
WO2016112086A1 (en) * 2015-01-08 2016-07-14 Alibaba Group Holding Limited Quantum key distribution system, method and apparatus based on trusted relay

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490891A (en) * 2013-08-23 2014-01-01 中国科学技术大学 Method for updating and using secret key in power grid SSL VPN
CN103905180A (en) * 2014-04-21 2014-07-02 西安电子科技大学 Method for enabling classical application to have access to quantum communication network
WO2016112086A1 (en) * 2015-01-08 2016-07-14 Alibaba Group Holding Limited Quantum key distribution system, method and apparatus based on trusted relay
CN105515766A (en) * 2015-12-16 2016-04-20 浙江神州量子网络科技有限公司 Application method of quantum key in stunnel
CN105471576A (en) * 2015-12-28 2016-04-06 科大国盾量子技术股份有限公司 Quantum key relaying method, quantum terminal nodes and quantum key relaying system

Also Published As

Publication number Publication date
CN106230582A (en) 2016-12-14

Similar Documents

Publication Publication Date Title
CN106230582B (en) Random routing method in quantum secret communication network
CN106330434B (en) First quantum node, second quantum node, secure communication architecture system and method
Sharma et al. Secure data transmission on MANET by hybrid cryptography technique
CN112822111B (en) Routing method for quantum and classical hybrid communication network
Kohno et al. Improvement of assurance including security for wireless sensor networks using dispersed data transmission
CN112953710B (en) Wireless/wired hybrid QKD network based on trusted relay
Kumar et al. A secure handshaking aodv routing protocol (SHS-AODV)
Rajipriyadharshini et al. Vampire attacks deploying resources in wireless sensor networks
El Mougy et al. Preserving privacy in wireless sensor networks using onion routing
CN111970245B (en) Heterogeneous layered anonymous communication network construction method and device
Chakrabarty et al. Black routing and node obscuring in IoT
Praba et al. Performance Analysis of Energy Efficient Multipath Routing Protocols in MANET
Sadkhan et al. The role of quantum and post-quantum techniques in wireless network security-status, challenges and future trends
CN112689282A (en) Anonymous communication scheme for protecting location privacy in wireless sensor network
Kimura et al. Security and dependability enhancement of wireless sensor networks with multipath routing utilizing the connectedness of joint nodes
Liu et al. Security Analysis of Stochastic Routing Scheme in Grid‐Shaped Partially‐Trusted Relay Quantum Key Distribution Network
Paruvathavardhini et al. A review on energy efficient routing protocols and security techniques for wireless sensor networks
Renuka et al. Providing security for multipath routing protocol in wireless sensor networks
Gupta et al. A confidentiality scheme for energy efficient leach protocol using homomorphic encryption
Mehic et al. QSIP: A quantum key distribution signaling protocol
Dholey et al. Proposal to Provide Security in MANET's DSRRouting Protocol
Sharma et al. A Secure Key Management on ODMRP in Mesh-Based Multicast Network
CN101588538A (en) WAPI multicast key agreement method and system
Stulman Deficiencies in spraying techniques for key exchange in MANETs
Bolla et al. Designing Energy Routing Protocol with Energy Consumption Optimization in Cognitive Radio Networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant