Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for achieving key management in wireless mobile ad hoc network based on identities

A mobile ad hoc network and key management technology, which is applied in the field of identity-based key management in wireless mobile ad hoc networks, can solve problems such as imperfect computing efficiency and security, strong security assumptions, etc., to achieve less computing overhead, The effect of wide application range and less network bandwidth overhead

Inactive Publication Date: 2014-05-14
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current schemes are not perfect in terms of computational efficiency and security, mainly: (1) using time-consuming bilinear pairing operations; (2) requiring strong security assumptions, such as requiring each update All nodes controlled by the attacker before the key must be discovered in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for achieving key management in wireless mobile ad hoc network based on identities
  • Method for achieving key management in wireless mobile ad hoc network based on identities
  • Method for achieving key management in wireless mobile ad hoc network based on identities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0047] Aiming at the deficiencies of the above-mentioned existing schemes and technologies, the present invention proposes an identity-based key management scheme under the wireless mobile ad hoc network environment, and realizes safe and efficient key management. Security means that the key management scheme has: the updated key is unforgeable (adaptive chosen-plaintext attack under the random oracle model).

[0048] The efficiency of the scheme is reflected in: (1) the adoption of Schnorr digital signature (Schnorr C P. Efficient identification and signatures for smart cards. Advances in Cryptology CRYPTO89 Proceedings. Lecture Notes in Computer Science. Springer Berlin / Heidelberg. 252) constructed identity-based signature technology (Liu J K, Baek J, Zhou J, et al. Efficient online / offline identity-based ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for achieving key management in a wireless mobile ad hoc network based on identities. The method comprises the steps that all public parameters and a master key needed for achieving key management are generated by a credible center; public keys and private keys of common nodes and public keys and private keys of distributed management nodes are initiated by the credible center; when a new common node asks to join in the network, the new common node executes an access permission protocol to obtain a secret key of the current time period from the distributed management nodes; when the public key of one common node needs to be repealed, one distributed management node initiates a public key repealing protocol and generates a digital signature for a repealing request together with other distributed management nodes, and after the digital signature of the request is successfully generated, the information for repealing the public key of the common node is broadcasted to other nodes. By means of the method for achieving key management in the wireless mobile ad hoc network based on identities, a more efficient key management scheme can be achieved in the wireless mobile ad hoc network, and less computation overhead and network bandwidth overhead are needed.

Description

technical field [0001] The invention relates to the field of security in wireless mobile ad hoc networks, in particular to the field of key management in wireless mobile ad hoc networks, and specifically refers to a method for realizing key management based on identity in wireless mobile ad hoc networks. Background technique [0002] Mobile ad hoc networks (MANETs) is a wireless mobile network formed by a group of mobile nodes with wireless communication devices. Currently, MANETs are mainly used in military, rescue, vehicle communication and sensor networks. [0003] The public key system provides a basic guarantee for wireless mobile ad hoc network security communication and authentication, in which key management (issue, update and revocation) is the foundation of the foundation. Set for the main characteristics of MANETs: no infrastructure, self-organization, peer-to-peer, dynamic network topology changes, limited communication bandwidth and energy, etc. The design of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04
Inventor 张勇吴松洋刘善军何俊峰
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products