Mobile ad hoc authentication method, network and system

A mobile self-organization and authentication method technology, applied in the field of communication, can solve the problems of high output bits of Hash function, reduce network reliability and security, synchronization attacks, etc., to solve the synchronization problem within the cluster, speed up processing, and ensure security. degree of effect

Inactive Publication Date: 2008-06-04
HUAWEI TECH CO LTD +1
View PDF0 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] In practical applications, there are the following problems: the threshold group signature scheme based on GQ signature proposed by Liu is too computationally intensive, and for the resource environment characteristics of mobile ad hoc networks, this scheme is not suitable for mobile ad hoc networks
It can be seen that the requirements for computing resources are very high, and the characteristic of the mobile ad hoc network is that there are no network nodes with strong processing capabilities such as base stations and gateways. All nodes are equal, and at most there are cluster heads with stronger processing capabilities. Therefore, it is difficult to apply this scheme to the security authentication of mobile ad hoc networks in practice
[0029] In addition, the GQ threshold group signature scheme is a protocol for general information signature. In the hierarchical authentication scheme of clustered MANET, the group signature should be issued to the user as an identity certificate, and the confidentiality and security of the identity certificate should also be considered. reuse, so this scheme also has deficiencies in this respect
[0030] However, if the above-mentioned second authentication scheme based on Hash chain is applied in mobile ad hoc network authentication, there will be two fatal problems: first, the synchronization problem is difficult to solve, and it is easy to cause synchronization attacks. All nodes in the mobile ad hoc network need to pass For multi-hop communication, authentication-related information needs to be synchronized among all nodes. This scheme requires too much information synchronization, thereby reducing network reliability and security; secondly, the Hash function H( ) outputs a large number of digits, It directly leads to an increase in the amount of calculation, which will also challenge the processing resources of MANET
[0031] Finally, the above-mentioned schemes each provide an authentication method, lack of an overall scheme for hierarchical distributed authentication of clustered mobile ad hoc networks, and need a distributed authentication method that can be applied in the actual mobile ad hoc network environment. layer authentication scheme
[0032] The main reason for this situation is that the above two schemes only solve the simple signature or authentication problem, and do not provide a complete hierarchical authentication scheme for clustered mobile ad hoc networks; and among them, due to the GQ threshold signature scheme The flaws in the theoretical basis of the scheme lead to a large demand for computing resources in this scheme; and the HORSE method based on the Hash chain also has a large amount of calculation due to too many output digits of the Hash function and cannot be realized. demand too much

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile ad hoc authentication method, network and system
  • Mobile ad hoc authentication method, network and system
  • Mobile ad hoc authentication method, network and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0069] The most basic networking method of mobile ad hoc networks is flat networking. The defects of this method prevent it from being promoted and developed, and clustered networking is widely recognized. Especially when the scale of the mobile ad hoc network is relatively large, the network needs to be managed hierarchically. The authentication mechanism of a simple flat network can no longer meet the authentication requirements of the network. Hierarchical distributed authentication is a good solution. Based on this starting point, the present invention proposes a hierarchical distributed authentication solution, which respectively uses an improved new threshold group signature protocol to achieve inter-cluster authentication, and uses a Hash chain-based HORSC...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the communication field and discloses an authentication method, a network and a system of mobile ad hoc network, which ensures the realization of layer distribution type authentication scheme of cluster mobile ad hoc network; and the requirement on computer processed resources is rational, which can be realized in practical application environment. The invention adopts a group network structure of cluster mobile ad hoc network and advocates layer distribution identity authentication scheme; and the inter-cluster communication used an improved new threshold group signature protocol which improves the original threshold group signature method based on GQ and decreases power index calculation times, improves calculation parallelism and reduces the requirement on processed resources; at the time of initialization, a certificate and a sub key are issued by the system uniformly; cluster heads which have enough numbers of sub keys can jointly recover system keys, thereby carrying out the group signature to issue certificates to new added nodes and using multi-leap serial communication for realizing united group signature.

Description

Technical field [0001] The present invention relates to the field of communications, in particular to a hierarchical distributed identity authentication scheme of a mobile self-organizing network. Background technique [0002] Mobile Ad Hoc Network ("MANET"), also known as mobile ad hoc network, is a special mobile network without wired infrastructure support. It consists of a group of mobile ad hoc networks with wireless transceivers. A non-base station multi-hop temporary autonomous network system composed of terminals. The establishment of this kind of network is quick and flexible, and is not restricted by wired networks. It is mainly used in special and emergency environments such as military battlefields, flood fighting and fire fighting, and inaccessible wiring. It also has some characteristics that general communication networks do not have: self-organization of the network Dynamic network topology; limited wireless transmission bandwidth; limitations of mobile terminals;...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L12/28
CPCH04L2209/80H04L9/3255Y02B60/50H04L9/085
Inventor 杨艳梅姚军曾贵华
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products