Mobile ad hoc authentication method and system

A technology of mobile self-organization and authentication method, applied in the field of communication

Inactive Publication Date: 2010-09-29
HUAWEI TECH CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0028]In practical application, there are the following problems: the threshold group signature scheme based on GQ signature proposed by Liu is too computationally intensive, and for the resource environment characteristics of mobile ad hoc networks, This solution is not suitable for mobile ad hoc network
It can be seen that the requirements for computing resources are very high, and the characteristic of the mobile ad hoc network is that there are no network nodes with strong processing capabilities such as base stations and gateways. All nodes are equal, and at most there are cluster heads with stronger processing capabilities. Therefore, it is difficult to apply this scheme to the security authentication of mobile ad hoc networks in practice
[0030] In addition, the GQ threshold group signature scheme is a protocol for general information signature, and the group signature is used as the identity in the hierarchical authentication scheme of clustered MANET The certificate is issued to the user, and the confidentiality and reuse of the identity certificate must also be considered, so this scheme also has shortcomings in this aspect
[0031] However, if the above-mentioned second authentication scheme based on Hash chain is applied to mobile ad hoc network authentication, there will be two fatal problems: first, the synchronization problem is difficult to solve , it is easy to cause synchronization attacks. All nodes in the mobile ad hoc network need to communicate through multi-hops, and authentication-related information needs to be synchronized among all nodes. This scheme requires too high information synchronization, which reduces network reliability and security; Secondly, the Hash function H(·) has a large number of output digits, which directly leads to an increase in the amount of calculation, and also challenges the processing resources of MANET
[0032]Finally, the schemes mentioned above each provide an authentication method, lacking an overall scheme for hierarchical distributed authentication of clustered mobile ad hoc networks, and There is a need for a hierarchical authentication scheme that can be applied in practical mobile ad hoc network environments
[0033]The main reason for this situation is that the above two solutions only solve the simple signature or authentication problem, and do not give a complete mobile ad hoc clustering solution. The hierarchical authentication scheme of the Internet; and among them, due to the theoretical foundation defect of the GQ threshold signature scheme, the demand for computing resources of the scheme is too large; and the HORSE method based on the Hash chain also causes a large amount of calculation due to too many output digits of the Hash function. too large to be implemented, and the way the solution operates is too demanding for synchronization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile ad hoc authentication method and system
  • Mobile ad hoc authentication method and system
  • Mobile ad hoc authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] When a new node joins, a specified number of cluster head nodes jointly issue a certificate to the new node according to their subkeys and according to the new threshold group signature protocol. cluster heads, and then interact with the new node according to the protocol, and obtain the certificate of the new node through distributed computing and communication, which can be authenticated in the same way according to the protocol;

[0074] Nodes perform identity authentication and inter-cluster communication through the new threshold group signature protocol based on certificates, and identity authentication can be implemented between nodes with certificates. The authentication method is consistent with the traditional threshold group signature;

[0075] In the cluster, the nodes only need to use the Hash Obtained Random Subset (HORSC) protocol for identity authentication and intra-cluster communication. This protocol can efficiently implement flat authentication, fully...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the communication field and discloses an authentication method, a network and a system of mobile ad hoc network, which ensures the realization of layer distribution type authentication scheme of cluster mobile ad hoc network; and the requirement on computer processed resources is rational, which can be realized in practical application environment. The invention adopts a group network structure of cluster mobile ad hoc network and advocates layer distribution identity authentication scheme; and the inter-cluster communication used an improved new threshold group signature protocol which improves the original threshold group signature method based on GQ and decreases power index calculation times, improves calculation parallelism and reduces the requirement on processed resources; at the time of initialization, a certificate and a sub key are issued by the system uniformly; cluster heads which have enough numbers of sub keys can jointly recover system keys, thereby carrying out the group signature to issue certificates to new added nodes and using multi-leap serial communication for realizing united group signature.

Description

technical field [0001] The invention relates to the communication field, in particular to a layered distributed identity authentication scheme of a mobile ad hoc network. Background technique [0002] Mobile ad hoc network (Mobile Ad Hoc Network, referred to as "MANET"), also known as mobile ad hoc network, is a special mobile network without wired infrastructure support. A non-base station multi-hop temporary autonomous network system composed of terminals. The establishment of this kind of network is fast and flexible, and it is not restricted by the wired network. It is mainly used in special and emergency environments such as military battlefields, flood fighting and fire fighting, and unwiring, and has some characteristics that general communication networks do not have: the self-organization of the network nature; dynamic network topology; limited wireless transmission bandwidth; limitations of mobile terminals; multi-hop routing; vulnerable to attacks and so on. Be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L12/28
CPCH04L2209/80H04L9/3255Y02B60/50H04L9/085
Inventor 杨艳梅姚军曾贵华
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products