Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for encryption authentication on Ad hoc network transmission layer protocol

A network transport layer, encryption and authentication technology, applied in wireless network protocol, network traffic/resource management, advanced technology, etc., can solve the problem of high encryption strength of XOR operation

Active Publication Date: 2011-02-23
BEIHANG UNIV
View PDF8 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Use XOR operation as encryption operation, if you use brute force cracking, as mentioned m XOR n=k, assuming k has L (L is the number of digits with larger median of m and n) bit length, then just go from k Reverse the values ​​of m and n, there are 2 L It can be seen that the encryption strength of the XOR operation is still very high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encryption authentication on Ad hoc network transmission layer protocol
  • Method for encryption authentication on Ad hoc network transmission layer protocol
  • Method for encryption authentication on Ad hoc network transmission layer protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Because the present invention is mainly to set forth the thought that method realizes, concrete realization can adopt the most suitable realization method according to concrete implementation environment (network environment, node type etc.), can adopt when introducing the specific implementation manner of technical scheme of the present invention below Some specific methods (such as specific hash functions, etc.), but the actual implementation is not limited to the above methods. The specific implementation of the encryption and authentication method on the transport layer between two nodes will be described intuitively below in conjunction with the accompanying drawings, figure 1 It is a flowchart of the encryption authentication method; figure 2 is the node ID table; image 3 Encryption process for authentication; Figure 4 for the key update process. The specific implementation process is as follows.

[0057] Encryption and authentication methods on a kind of A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encryption authentication on an Ad hoc network transmission layer protocol, which comprises five parts and 18 steps, wherein the five parts are a configuration stage, an authentication stage, a key negotiation stage, an encryption process and a key update flow. The encryption authentication method of the invention is applied to a hand shaking process in the end-to-end communication between two nodes in a multihop Ad hoc network, wherein the two nodes pass through message authentication code verification (MAC) for mutual verification; after the authentication successes, key negotiation is performed by using an elliptic curve diffie-hellman (ECDH) algorithm; and a subsequent message is encrypted by using a shared key acquired in the key negotiation process as a key material and by using an advanced encryption standard (AES) algorithm, and a key update flow is initiated in a communication process. In the authentication and key negotiation process, an exclusive or gate (XOR) algorithm is used for encrypting authentication information and key negotiation information, the safety is high, the efficiency is high, the system expense is small, and the encryption strength is high; and thus, the method has a promising application prospect in the technical field of wireless networks.

Description

(1) Technical field [0001] The invention relates to an encryption and authentication method for ensuring end-to-end communication security of an ad hoc network (Ad hoc network), in particular to an encryption and authentication method on the transport layer protocol of the Ad hoc network, which belongs to the technical field of wireless networks. (2) Background technology [0002] Ensuring communication security is a challenge that network applications must face, especially in wireless environments. The present invention is based on the Ad Hoc network, it does not need the support of infrastructure, and can realize communication through the free networking of nodes. The research on the Ad hoc network is initiated by military communication applications, and military applications are still its main focus at present. At the same time, it also has a very broad application prospect in the civilian field, which can support mobile commerce, mobile conferences, information exchange ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W80/06H04W28/18H04W12/03H04W12/0431
CPCY02D30/70
Inventor 刘建伟陈杰毛剑修春娣尚涛张其善
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products