Volume 32 Issue 07
Jul.  2006
Turn off MathJax
Article Contents
Chen Wei, Long Xiang, Gao Xiaopenget al. Identity-based authentication scheme for mobile ad hoc networks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(07): 869-872. (in Chinese)
Citation: Chen Wei, Long Xiang, Gao Xiaopenget al. Identity-based authentication scheme for mobile ad hoc networks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(07): 869-872. (in Chinese)

Identity-based authentication scheme for mobile ad hoc networks

  • Received Date: 21 Jul 2005
  • Publish Date: 31 Jul 2006
  • In order to realize secure and efficient mobile node authentication in mobile ad hoc networks (MANET) which have no traditional public key infrastructure (PKI), a scheme consisting of identity-based cryptograph, distributed secrete sharing algorithm and elliptic curves encryption was proposed. Identity-based digital signature algorithm was briefly discussed. Lagrange interpolating polynomial was used to distribute master secret key among system nodes. A model describing secure node key issue was given, and a distributed procedure based on the given model was presented to securely issue node key by using elliptic curves encryption. The security and efficiency of the proposed algorithm was analyzed. According to the property of the bilinear pairing, the generation and update of session keys was discussed. The proposed authentication scheme could be used to realize efficient and secure authentication in distributed mobility scenarios, and to generate non-interactive one time session keys between two mobile nodes.

     

  • loading
  • [1] IETF MANET work group. http://www.ietf.org/html.charters/manet-charter.html [2] Khalili A, Katz J, Arbaugh W,et al. Toward secure key distribution in truly ad hoc networks Proceedings of the 2003 Symposium on Application and the Internet Workshops. :IEEE Computer Society, 2003:1-5 [3] Deng Hongmei, Mukherjee A, Agrawal D P. Threshold and identity-based key management and authentication for wireless ad hoc networks Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC 2004). :IEEE Computer Society, 2004:107-111 [4] Dolev D, Yao A C. On the security of public-key protocols[J]. IEEE Trans on Information Theory, 1983, 29(2):198-208 [5] Shamir S. How to share a secret[J]. Communications of the ACM, 1979, 22(11), 612-613 [6] Cha J ,Cheon J H. An identity-based signature from gap diffie-hellman groups Proc of the PKC 2003. :Springer-Verlag, 2003, 18(30):18-30 [7] Shamir A. Identity-based cryptosystems and signature schemes Proceedings of Crypto′84, Lecture Notes in Computer Science. :Springer-Verlag, 1984:47-53 [8] Boneh D, Franklin M. Identity based encryption from the Weil pairing Extended Abstract in Proceedings of Crypto ′2001, Lecture Notes in Computer Science. :Springer-Verlag, 2001:213-229 [9] Stallings W. Cryptography and network security:principles and practice [M]. 3rd ed. Upper Saddle River N J :Prentice Hall, 2003 [10] Mao Wenbo. Modern cryptography:theory and practice [M]. Upper Saddle River, NJ :Prentice Hall PTR, 2004 [11] Eastlake D, Jones P. US secure hash algorithm 1 (SHA1). IETF RFC3174, 2001.http://www.ietf.ore/rfc/rfc3174.txt?number=3174
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3758) PDF downloads(1169) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return