Identity-based authentication scheme for mobile ad hoc networks
-
摘要: 针对移动自组网无公钥基础设施的特点,采用基于身份的密码学算法、分布式秘密共享算法和椭圆曲线加密算法,实现安全高效的移动节点认证.简单讨论基于身份的数字签名算法;介绍如何使用Lagrange插值公式,实现分布式的系统主密钥;然后给出节点密钥安全分发的模型,并在此模型的基础上,基于椭圆曲线加密算法实现安全的分布式节点密钥签发;给出算法安全性和效率分析;根据双线性对的特点,讨论会话密钥的产生和更新.给出的认证方法,具有分布式实现和安全高效的特点,同时可以非交互式产生一次性会话密钥,适用于分布式移动网络环境.Abstract: In order to realize secure and efficient mobile node authentication in mobile ad hoc networks (MANET) which have no traditional public key infrastructure (PKI), a scheme consisting of identity-based cryptograph, distributed secrete sharing algorithm and elliptic curves encryption was proposed. Identity-based digital signature algorithm was briefly discussed. Lagrange interpolating polynomial was used to distribute master secret key among system nodes. A model describing secure node key issue was given, and a distributed procedure based on the given model was presented to securely issue node key by using elliptic curves encryption. The security and efficiency of the proposed algorithm was analyzed. According to the property of the bilinear pairing, the generation and update of session keys was discussed. The proposed authentication scheme could be used to realize efficient and secure authentication in distributed mobility scenarios, and to generate non-interactive one time session keys between two mobile nodes.
-
[1] IETF MANET work group. http://www.ietf.org/html.charters/manet-charter.html [2] Khalili A, Katz J, Arbaugh W,et al. Toward secure key distribution in truly ad hoc networks Proceedings of the 2003 Symposium on Application and the Internet Workshops. :IEEE Computer Society, 2003:1-5 [3] Deng Hongmei, Mukherjee A, Agrawal D P. Threshold and identity-based key management and authentication for wireless ad hoc networks Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC 2004). :IEEE Computer Society, 2004:107-111 [4] Dolev D, Yao A C. On the security of public-key protocols[J]. IEEE Trans on Information Theory, 1983, 29(2):198-208 [5] Shamir S. How to share a secret[J]. Communications of the ACM, 1979, 22(11), 612-613 [6] Cha J ,Cheon J H. An identity-based signature from gap diffie-hellman groups Proc of the PKC 2003. :Springer-Verlag, 2003, 18(30):18-30 [7] Shamir A. Identity-based cryptosystems and signature schemes Proceedings of Crypto′84, Lecture Notes in Computer Science. :Springer-Verlag, 1984:47-53 [8] Boneh D, Franklin M. Identity based encryption from the Weil pairing Extended Abstract in Proceedings of Crypto ′2001, Lecture Notes in Computer Science. :Springer-Verlag, 2001:213-229 [9] Stallings W. Cryptography and network security:principles and practice [M]. 3rd ed. Upper Saddle River N J :Prentice Hall, 2003 [10] Mao Wenbo. Modern cryptography:theory and practice [M]. Upper Saddle River, NJ :Prentice Hall PTR, 2004 [11] Eastlake D, Jones P. US secure hash algorithm 1 (SHA1). IETF RFC3174, 2001.http://www.ietf.ore/rfc/rfc3174.txt?number=3174
点击查看大图
计量
- 文章访问数: 3833
- HTML全文浏览量: 52
- PDF下载量: 1171
- 被引次数: 0