Ad Hoc network key management method

A management method and network key technology, which are applied in the field of Ad Hoc network key management, can solve the problem that the key management scheme is no longer applicable, and achieve the effects of high reliability, low communication volume and strong robustness.

Inactive Publication Date: 2013-05-08
WUXI NANLIGONG TECH DEV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional public key management schemes generally have a trusted certification center CA, which is responsible for public key distribution, certificate issuance, certificate revocation, certification, etc. CA is the center of key management work, and Ad Hoc network is a Mobile, decentralized, self-organizing network, which makes the key management scheme in the traditional network no longer applicable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ad Hoc network key management method
  • Ad Hoc network key management method
  • Ad Hoc network key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] An Ad Hoc network key management method, through the identity recognition protocol, that is, the prover P does not reveal his secret identity, nor does he prove to V the legitimacy of P's public identity, but by showing that V has P's secret knowledge of the identity, thus proving that V knows P's secret identity and the legitimacy of his public identity.

[0024] Wherein, the described identity recognition protocol is secretly selected by a trustworthy center in the form of 4r+3 two large prime numbers of p , q , making n=pq is computationally difficult to decompose, and then publish n Modulo all users, P's secret identity is given by k Number c 1 ,c 2 ,…,c k Composition, P's public identity is d 1 ,d 2 ,…,d k , k ,and , , in the initial state, V knows the public n and P's public identity , now P wants to prove to V that P knows his secret identity without revealing his secret identity information, perform the following steps:

[0025] 1. P ra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of key management, in particular to an Ad Hoc network key management method. The Ad Hoc network key management method is based on an identity recognition agreement, namely a certifier P does not give away the secret identity of the certifier P and does not prove legality of the public identity of the P to a V, but proves that the V knows the legality of secret identity of the P and the pubic identity of the P by showing that the V has knowledge of the secret identity of the P. No server node is needed, and parity and self-organization are truly achieved. The Ad Hoc network key management method has the advantages of being consistent with the characteristics of the Ad Hoc network, low in communication traffic, high in reliability and strong in robustness.

Description

technical field [0001] The invention belongs to the technical field of key management, and in particular relates to an Ad Hoc network key management method. Background technique [0002] The Ad Hoc network originated from the PRNET (Packet Radio Network) of the US military. It is a multi-hop temporary autonomous system composed of a group of mobile terminals with wireless transceivers. Ad Hoc network nodes can be moved at will, the status of nodes is equal, the network topology changes dynamically, no infrastructure is required, rapid deployment, no control center is required, and it has strong invulnerability. However, due to the inherent weaknesses of the Ad Hoc network, such as the use of wireless signals as the transmission medium and the non-direction of wireless signals, it is more vulnerable to attacks. [0003] How to ensure the secure communication of Ad Hoc network has become the focus of current research, and the basis of secure communication service is to provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W84/18H04W12/00H04W12/0433
Inventor 李千目刘振徐阳侯君
Owner WUXI NANLIGONG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products