Method for entity authentication based on secret sharing encryption

An authentication method and secret sharing technology, which is applied in the field of entity authentication schemes, can solve the problem that the security requirements of cluster heads are relatively high, and achieve the effect of preventing impersonation attacks

Inactive Publication Date: 2010-06-16
UNIV OF SCI & TECH BEIJING
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this scheme: the network management center is absolutely safe and has relatively high requirements for the security of the cluster head

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for entity authentication based on secret sharing encryption
  • Method for entity authentication based on secret sharing encryption
  • Method for entity authentication based on secret sharing encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Below in conjunction with example the present invention will be further described:

[0038] 1) Network clustering

[0039] Assuming that there are 5 nodes in a certain cluster of self-organizing network, the distance relationship between them can be expressed by matrix B.

[0040] B = 0 8 1 6 5 8 0 6 2 7 1 6 0 3 6 6 2 3 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for entity authentication based on secret sharing encryption, which is suitable for a self-organizing network and relates to the field of safety-related application of a wireless network in an information safety technique. Aiming at the characteristics of limited energy consumption and storage of self-organizing network nodes, the scheme uses a secret sharing technique and a symmetric key algorithm to effectively reduce the authentication time delay and improve the network life time; and simultaneously, a plurality of times of authentications ensure that the safety is not reduced. Besides, when a cluster head is arranged in the self-organizing network, the invention also provides a power consumption minimization algorithm to shorten the distance of transmitted signals between nodes, effectively reduce the node energy consumption and improve the network life time.

Description

technical field [0001] The invention relates to the security-related application field of wireless networks in information security technology, in particular to an entity authentication scheme in self-organizing networks. Background technique [0002] Mobile ad hoc network is a temporary autonomous system composed of many wireless mobile nodes that does not depend on any fixed infrastructure and has no strict control center. Because it has the characteristics of fast networking, high invulnerability and no fixed infrastructure, it has gradually become one of the focuses of wireless network research. However, from the characteristics of the network structure, the mobile ad-hoc network is facing serious security threats: it is vulnerable to eavesdropping, counterfeiting and other attacks; nodes in the network may come from selfish attacks from other nodes; And it changes accordingly; the execution of algorithms and protocols requires the cooperation of multiple nodes, which p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04W12/04H04W84/18H04W12/0431H04W12/0433
CPCY02B60/50Y02D30/70
Inventor 周贤伟杜利平刘涛郭继文王超
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products