Certificateless key agreement method on basis of mobile Ad Hoc network

A key agreement, certificate-free technology, applied in the field of network communication security, can solve problems such as single point of failure, node identity authenticity, private key confidentiality cannot be guaranteed, key escrow, etc., to achieve the effect of solving single point of failure

Active Publication Date: 2014-04-02
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the ID-PKC scheme introduces PKG, PKG knows the private keys of all nodes, which leads to the problem of key escrow and single point of failure
Once

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless key agreement method on basis of mobile Ad Hoc network
  • Certificateless key agreement method on basis of mobile Ad Hoc network
  • Certificateless key agreement method on basis of mobile Ad Hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] The preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0110] In this embodiment, the system is composed of a TTP and multiple movable free nodes, such as figure 1 shown. TTP is responsible for the generation and distribution of necessary parameters, and decides whether to allow a node to join the network.

[0111] Such as figure 2 As shown, this embodiment implements key agreement according to the following steps:

[0112] 1. Initialize the system network:

[0113] A reliable third-party TTP generates the necessary parameters in the network and notifies all nodes in the network. Network initialization includes 5 steps:

[0114] 1) TTP selects a cyclic addition group G1 and a cyclic multiplication group G2, they have the same prime order q, and construct a bilinear map through G1 and G2: : G1×G1→G2;

[0115] 2) TTP arbitrarily selects a generator G of the group G1;

[0116] 3) TTP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a certificateless key agreement method on the basis of a mobile Ad Hoc network, which comprises the following steps of: 1, initializing a system network; 2, constructing a network main private key, i.e. selecting a (t-1)th-degree polynomial to exchange necessary information at each node, enabling random t nodes or more than t nodes to mutually cooperate to obtain the network main private key and simultaneously obtaining a network public key; 3, generating key pairs for the nodes by utilizing the main private key in the network; 4, carrying out secrete communication among the nodes by utilizing the generated keys so as to implement the encrypting and decrypting process. The certificateless key agreement method has no problems of certificate verification and key escrow when implementing key agreement; meanwhile, dangerous nodes can be detected; moreover, a recommended encrypting scheme can have fewer encrypting items on the premise of ensuring security and the calculated amount and the communication traffic are reduced, and thus, the certificateless key agreement method has good practicality and security.

Description

technical field [0001] The invention relates to a key management method in a mobile Ad Hoc network, in particular to the key negotiation problem between mobile nodes, and belongs to the field of network communication security. Background technique [0002] Mobile Ad Hoc Network (MANET) is a new self-organizing network structure that does not depend on any fixed infrastructure or special nodes. Each node in the network is mobile and has limited resources. The entire network is formed by the dynamic interconnection between mobile nodes, forming a dynamic network topology. Due to the self-organizing feature of the mobile Ad Hoc network, which supports dynamic topological connections and multi-hop communication between mobile nodes, the network has strong self-organization, robustness and ease of construction. Due to these characteristics of the mobile Ad Hoc network, this type of network has been favored more and more recently, and is widely used in special fields, such as th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W84/18H04W12/041H04W12/0431
Inventor 郑军徐三春郭先臣王殿欣
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products