Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile CA node electing method based on MD5 hash information abstract

An information summary and node technology, applied in wireless communication, energy-saving ICT, encryption device with shift register/memory, etc., can solve the problems that CA nodes cannot continue to provide certificate services, other nodes provide certificate services, and authentication mechanism risks , to avoid providing certificate services, reduce the probability of being attacked, and save energy consumption

Active Publication Date: 2014-07-02
NINGBO UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in the Ad-Hoc network, a fixed node is usually used as the CA node. However, compared with ordinary nodes, the CA node needs to consume more energy in order to provide these certificate-related services. For Hoc network nodes, it is an unfavorable factor. Once the CA node provides certificate services for a long time, the excessive energy consumption will cause the CA node to continue to provide certificate services; in addition, when the CA node in the Ad-Hoc network After the node is attacked, it also cannot provide certificate services for other nodes. To sum up, in the Ad-Hoc network, if a node is fixed as the CA node, the authentication mechanism of the network will face huge risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile CA node electing method based on MD5 hash information abstract
  • Mobile CA node electing method based on MD5 hash information abstract
  • Mobile CA node electing method based on MD5 hash information abstract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0019] A kind of mobile CA node election method based on MD5 hash information abstract that the present invention proposes, its flow chart is as follows figure 1 As shown, it includes the following steps:

[0020] 1) Assuming that there is a new node to be added to the Ad-hoc network, this new node is the current application node.

[0021] 2) The current application node generates a certificate request file, and then the current application node performs MD5 hash information digest calculation on the generated certificate request file, and obtains a string of 16-byte request data representing the certificate request file. The data is integer data expressed in hexadecimal.

[0022] 3) The current application node broadcasts the request data obtained in step 2) to all nodes in the Ad-hoc network.

[0023] 4) After each node in the Ad-hoc netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile CA node electing method based on an MD5 hash information abstract. The method includes the steps that MD5 hash information abstract calculation is performed on certificate demand files generated by applied nodes, and demand data are obtained; each node of all the nodes is elected as a CA node according to integer data and the received demand data, wherein the integer data are obtained after data composed of the generated random number, the IP address and the MAC address are calculated through the MD5 hash information abstract; due to the fact that the key factor for determining the CA node lies in the certificate demand files generated by the applied nodes and the random number generated by the node in the Ad-hoc network, for the same applied node, a CA node electing result obtained each time differs from other results, and for the different applied nodes, the CA node electing results are different. Thus, the CA nodes are effectively prevented from providing a certificate service for a long time and the energy consumption of the CA nodes is reduced. Meanwhile, the probability of attacking the CA nodes is greatly reduced.

Description

technical field [0001] The invention relates to a CA node election method, in particular to a mobile CA node election method based on MD5 hash information abstract. Background technique [0002] Ad-Hoc network is a mobile network without wired infrastructure, Ad-hoc network is directly composed of multiple nodes, in Ad-Hoc network, these nodes are both the sender and receiver of the message, and the forwarder of the message, " The term "Ad-hoc network" was finally determined by the IEEE802.11 standard committee to describe an ad-hoc, peer-to-peer multi-hop network. At the same time, IEFT classified Ad-hoc networks as MANET, that is, mobile multi-hop networks. [0003] During the development of the Ad-Hoc network, most of the researches were focused on the network routing protocol, but the security problems faced by the Ad-Hoc network became more and more prominent, and began to attract more and more scholars' attention. -Hoc network security issues, on the one hand, secure ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06H04L29/06H04W12/06H04W52/02
CPCY02B60/50Y02D30/70
Inventor 王晓东胡珊逢周宇叶庆卫其他发明人请求不公开姓名
Owner NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products