Novel message signature method for sparse movable Ad Hoc network

A network message, sparse technology, applied in the direction of electrical components, wireless communication, security devices, etc., to achieve the effect of reducing the length

Inactive Publication Date: 2011-05-25
UNIV OF SCI & TECH OF CHINA
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Document 3: "Efficient Identity Based Signature Schemes Based on Pairings" (HESS F, SAC'02) addresses the problems of key revocation and ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel message signature method for sparse movable Ad Hoc network
  • Novel message signature method for sparse movable Ad Hoc network
  • Novel message signature method for sparse movable Ad Hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention has no special requirements on the specific network topology structure of sparse Ad Hoc and the properties of network nodes, and the method of the present invention can be applied to any sparse mobile Ad Hoc network for message signature authentication, and can be widely used in various sparse Ad Hoc scenarios .

[0042] The following is a detailed introduction to the step process of the embodiment:

[0043] Such as figure 1 Shown, the system establishment step flow process of the present invention is as follows:

[0044] Step 101: PKG selects the additive group G whose upper order is q on the elliptic curve 1 , the multiplicative group G of order q 2 , G 1 The generator of is P, |G 1 |and|G 2 |both are 160, that is, the length of the elliptic curve key used is 160 bits;

[0045]Step 102: Select a hash function H 1 : {0, 1}*×G 1 →G 1 ,

[0046] Step 103: Select a bilinear map

[0047] Step 104: PKG maintains the ID list, records the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a novel message signature method for a sparse movable Ad Hoc network, which can be used for the message signature authentication of the sparse Ad Hoc network, and belongs to the technical field of wireless communication networks. The method comprises the following steps of: establishing a system, generating a private key, executing a signature algorithm and executing a verification algorithm. In the method, the need of a signing and authenticating third party is obviated by adopting an identity-based cryptosystem; key revocation is performed by using key survival time; a node private value is added in the process of generating the private key to solve the problem of key escrow; the harm to the network due to key revealing is limited by using a message signature survival time threshold value; and the signature by elliptic curve bilinear pair reduces key length, calculated amount, signature length, storage space and the bandwidth of a communication link.

Description

technical field [0001] The invention belongs to the technical field of wireless communication networks, in particular to a message signature method of a sparse mobile Ad Hoc network. Background technique [0002] The problem of malicious node destruction in sparse Ad Hoc networks can be solved by signature authentication on messages, and illegal messages can be detected early and processed through authentication signatures to prevent the proliferation of illegal messages. [0003] Document 1: "Multi-user Broadcast Authentication in Wireless Sensor Networks" (REN K, LOUW, ZHANG Y, IEEE SECON'07) assumes that each node in the delayed wireless sensor network knows the public keys of all other legal nodes. When receiving When a message is received, the node uses all the public keys it knows to traverse to verify the legitimacy of the message. This method needs to face the problems of a large number of stored public keys, public key updates, and complex calculations. [0004] Do...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W12/0433
Inventor 俞能海刘斌龙可李铮杨福荣
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products