A Certificateless Key Agreement Method Based on Mobile Ad Hoc Network

A key agreement, certificate-free technology, applied in the field of network communication security, can solve problems such as single point of failure, key escrow, network failure, etc., to achieve the effect of solving single point of failure

Active Publication Date: 2016-09-28
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the ID-PKC scheme introduces PKG, PKG knows the private keys of all nodes, which leads to the problem of key escrow and single point of failure
Once the PKG node is captured, the authenticity of the node identity and the confidentiality of the private key cannot be guaranteed, and the entire network will fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Certificateless Key Agreement Method Based on Mobile Ad Hoc Network
  • A Certificateless Key Agreement Method Based on Mobile Ad Hoc Network
  • A Certificateless Key Agreement Method Based on Mobile Ad Hoc Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0110] In this embodiment, the system consists of one TTP and multiple movable free nodes, such as figure 1 shown. TTP is responsible for the generation and distribution of necessary parameters, and decides whether to allow a node to join the network.

[0111] like figure 2 As shown, this embodiment implements key negotiation according to the following steps:

[0112] 1. Initialize the system network:

[0113] A reliable third-party TTP generates the necessary parameters in the network and informs all nodes in the network. The network initialization includes 5 steps:

[0114] 1) TTP selects a cyclic addition group G1 and a cyclic multiplication group G2, they have the same prime order q, through G1 and G2, construct a bilinear map: : G1×G1→G2;

[0115] 2) TTP arbitrarily selects a generator G of group G1;

[0116] 3) TTP selects th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a kind of non-certificate key negotiation method based on mobile Ad Hoc network, comprises the following steps: 1, the initialization of system network; Any t or more than t nodes cooperate with each other to obtain the network master private key and the network public key at the same time; 3. Use the master private key in the network to generate a key pair for the node; 4. Use the generated key pair to conduct inter-node The secret communication realizes the encryption and decryption process. The present invention realizes the key negotiation, does not have the problem of certificate verification and key trusteeship, and can detect dangerous nodes at the same time, and the recommended encryption scheme has fewer encryption items under the premise of ensuring security, which reduces calculation Therefore, it has better practicability and security.

Description

technical field [0001] The invention relates to a key management method in a mobile Ad Hoc network, in particular to the problem of key negotiation between mobile nodes, and belongs to the field of network communication security. Background technique [0002] Mobile Ad Hoc Network (MANET) is a new self-organizing network structure that does not depend on any fixed infrastructure or special nodes. Each node in the network is mobile and has limited resources. The entire network is formed by dynamic interconnection between mobile nodes, forming a dynamic network topology. Due to the self-organizing feature of the mobile Ad Hoc network and supporting dynamic topology connection and multi-hop communication between mobile nodes, the network has strong self-organization, robustness and ease of construction. Due to these characteristics of the mobile Ad Hoc network, this type of network has been favored more and more recently, and is widely used in special fields, such as the mili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W84/18H04W12/041H04W12/0431
Inventor 郑军徐三春郭先臣王殿欣
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products