Safety guide model for distributed identity authentication in mobile self-organizing network

A technology of mobile self-organization and security guidance, applied in user identity/authority verification, data exchange through path configuration, etc., can solve the problems of high computational cost, difficulty in practical use, and no security guidance model found, etc., to resist insects Hole attack or other replay attack, freshness guarantee, load reduction effect

Inactive Publication Date: 2007-04-25
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Wenliang Du et al. used Blom's key pre-distribution model to give a new key pair pre-distribution model in multiple key spaces. However, the calculation overhead of this model is relatively large, and the network deployment will directly affect the network secure connectivity, it is difficult to have a practical possibility
D.G.Liu and P.Ning proposed a physical location-based key pair security boot model for static sensor networks, which introduced geographic location information on the basis of the random key pair model, and adopted C.Blundo's proposed The key pair generation model of the binary t-degree polynomial divides the network into equal-sized cells (Cells) according to the location information, and each cell area shares a polynomial, but this model essentially discusses a static network in which nodes do not move , so this method is not practical for mobile ad hoc networks
At present, the research on the security boot model is mainly concentrated in the field of key pre-sharing technology, and no security boot model for distributed identity authentication in mobile ad hoc networks has been found in domestic and foreign literature and periodicals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety guide model for distributed identity authentication in mobile self-organizing network
  • Safety guide model for distributed identity authentication in mobile self-organizing network
  • Safety guide model for distributed identity authentication in mobile self-organizing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] 1. Establishment of Threshold Digital Signature Key and Import of Signature Mechanism

[0009] Before introducing the security boot model proposed by the present invention in detail, the relevant parameters are described in advance as follows:

[0010] p, p': 10 200 A large prime number that satisfies p□1(mod8) and p′□1(mod8);

[0011] q: a large prime factor of p′□1;

[0012] h:

[0013] g: g h (p′□1) / q mod p′, where

[0014] y: y g m mod p, where m is the secret key and y is the public key:

[0015] Primitive elements of the finite field GF(p′);

[0016] H(m): a one-way hash function on the finite field GF(p′);

[0017] where the parameters y, p′, q, h, g, and is public.

[0018] 1.1 The establishment process of the threshold digital signature key

[0019] A polynomial H of degree t-1 is secretly selected by the secure boot server over the finite field GF(p′) M (x) and satisfy H M (0)□M, as follows:

[0020]

[0021] where a i (i□1,...,t□1) i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety guide module for distributed identification check in mobile self-organism network. Wherein, it comprises two processes that guiding the safety mode (with public variable and calculate algorism) based on threshold digit sign to all nodes; using said safety mode to process distributed safety identification check. The invention has the advantages that the resource route will not be changed in route request process, to avoid false sign; and since it has mark of route request message, the bugged data pack can not be rearranged, to prevent attach; and it has jump identification check, to avoid DoS attach of malice node.

Description

technical field [0001] The present invention relates to the security technical field of mobile ad hoc networks, in particular to a security guidance model for distributed identity authentication in a mobile ad hoc network. The model introduces threshold digital signature methods into the entire network. The security basis for identity authentication is established, so that distributed identity authentication for any node can be realized simply and efficiently after the system is running. Background technique [0002] Mobile Ad hoc Network (English: Mobile Ad hoc Network, English abbreviation: MANET) is usually a multi-hop temporary autonomous network composed of a group of wireless mobile nodes without fixed network connection support. These nodes must cooperate to communicate with nodes beyond the wireless distance by forwarding packets between each other. Compared with traditional networks with fixed network connections, MANET networks are more vul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L12/28
Inventor 冯力袁卫东李自力张毅
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products