Implementation method for reducing amount of calculation for managing cipher key of MANET network

A network key and calculation technology, which is applied in the field of network security protection, can solve the problems of the overall performance of the system, the system cannot run normally, and the weak processing ability of the MANET network terminal, so as to reduce the calculation amount and improve the usability.

Inactive Publication Date: 2007-02-21
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] MANET network terminals have weak processing capabilities. If complex algorithms are used, it will inevitably have a great impact on the overall performance of the system, which will cause the system to fail to operate normally. Research on the calculation amount problem, the purpose of the present invention is how to reduce the mobile terminal calculation amount problem of MANET network key management, and achieved better results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method for reducing amount of calculation for managing cipher key of MANET network
  • Implementation method for reducing amount of calculation for managing cipher key of MANET network
  • Implementation method for reducing amount of calculation for managing cipher key of MANET network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] (i) Initialization

[0100] P i Run the probabilistic polynomial time algorithm G(i, 1 l ), the input value is the security parameter l, and the output value is the key SK i ={p i ,q i} and PK i =n i , P i broadcast n i . After initialization, each terminal is able to i know other terminals n i information, recorded as:

[0101] N j = Π j = 1 n j ≠ i n j .

[0102] (ii) Key agreement

[0103] P i pick bit k i and a random integer x i ∈ Z n i * .

[0104] if k i = 0,p i calculate X i = ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises: analyzing the MANET network model to find a CA management model fitting for the MANET network characters, and generating the system CA using threshold approach; analyzing the scheme for partitioning the MANET network into subgroups in order to provide the concept and scheme for making subgroup partition for MANET network; providing a hybrid encryption method to implement the security protection of MANET network. The invention either uses the fastness and simpleness of symmetry encryption, and or uses asymmetric cipher key to authenticate identity and manage cipher key.

Description

technical field [0001] The invention relates to a realization method for reducing the calculation amount of MANET network key management, which belongs to the field of network security protection. Background technique [0002] MANET is a network of multiple mobile nodes connected through wireless links to realize communication. This network has the characteristics of time-varying network topology and multi-hop self-organization. As the network concept that does not require infrastructure support begins to take shape in the United States, the MANET network has developed rapidly. The MANET network technology appeared after the packet switching technology, and its main ideological basis comes from the concept of packet radio network (PRNet: Packet Radio Network) funded by the US Defense Advanced Research Projects Agency (DARPA). Technology to enable effective communication in environments not constrained by fixed or wired network infrastructure. The research on Survivable Ada...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/14H04L12/24
Inventor 王顺满陶然王越周四永
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products