Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless multi-hop network key management method based on ID

A wireless multi-hop network and key management technology, which is applied in the public key, network topology, wireless communication and other directions of secure communication, and can solve the problem that the key management method is not suitable for large-scale networks and wireless multi-hop networks. and other issues to achieve the effect of reducing the number of queries, reducing the amount of communication, and improving security and performance.

Inactive Publication Date: 2008-07-16
CHINA IWNCOMM
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide an ID-based wireless multi-hop network key management method, which solves the problem that the existing key management method based on pre-shared keys is not suitable for large-scale networks and PKI-based key management The technical problem that the method is not suitable for wireless multi-hop network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless multi-hop network key management method based on ID

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The invention is applicable to the security application protocol when the WAPI framework method (TePA, an access control method based on ternary peer-to-peer authentication) is applied on specific networks including wireless local area networks and wireless metropolitan area networks.

[0016] Wireless multi-hop networks include low-speed wireless personal area networks, high-speed wireless personal area networks, and wireless sensor networks. This key management method is applicable to these networks.

[0017] The ID-based wireless multi-hop network key management method is described in detail as follows: ID-based wireless multi-hop network key management mainly includes key generation, distribution, storage, modification and revocation.

[0018] The specific implementation of the ID-based wireless multi-hop network key management method is as follows:

[0019] 1. Key generation:

[0020] In the ID-based cryptographic system, since the ID-based private key is equal to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an ID-based wireless multi-hop network key management method which is applicable to a safety application protocol when a WAPI frame method (TePA, an access control method based on the ternary peer-to-peer identification) is applied in a concrete network containing a WLAN, a WMAN and a WPAN. The key management method of the invention comprises the steps of key generation, key distribution, key storage, key modification and key revocation. The invention solves the technical problems that the prior pre-share-key based key management method is not suitable for larger networks and the PKI-based key management method is not suitable for wireless multi-hop networks; the public-key system and the ternary structure are adopted, thereby improving the security and the performance of the wireless multi-hop networks.

Description

technical field [0001] The invention relates to a wireless network key management method, in particular to an ID-based wireless multi-hop network key management method. Background technique [0002] With the development of computer network and global mobile communication technology, portable digital processing terminal equipment has become a necessity in people's daily life and office, these terminal equipment include notebook computers, personal digital assistants (PDA), computer peripherals, mobile phones, pagers and home electronics, etc. They all have strong processing power and large storage space, thus forming a personal operating space (POS). However, at present, most of the information exchange between these terminal devices still depends on the connection of cables, which is very inconvenient to use. People increasingly need a wireless technology to connect these terminal devices in the personal operating space to truly realize the communication between terminal de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0866H04L63/061H04W12/04H04W84/18H04L2209/80H04L9/0891H04L9/083H04L2463/061H04W12/041H04W12/0431H04W12/0433H04L9/30H04L12/28
Inventor 肖跃雷曹军赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products