期刊文献+

基于ID口令认证的Ad Hoc网密钥协商协议

A Key Agreement Protocol for Ad Hoc Networks Based on ID and Password Authentication
下载PDF
导出
摘要 基于ECC(Elliptic Curves Cryptography),提出一种新的适用于ad hoc网的基于口令认证的多方密钥协商协议。该协议包括系统初始化、基于ID的口令进化算法、节点身份认证算法和节点会话密钥算法4部分。该协议采用身份标识ID口令进化与Waters签名方案相结合来认证节点公钥的有效性与节点身份的可靠性。共享口令的进化机制保证每次认证节点密钥和协商密钥时口令的新鲜性和安全性。新协议具有抗口令的字典攻击、抗中间人攻击、抗重放攻击、密钥独立和前向安全等多种安全特性,分析表明该协议非常适用于无固定基础设施的移动ad hoc网。 A novel multi-party key agreement protocol with password authentication for ad hoc network is proposed.The protocol is composed of system initialization,ID-based password evolvement algorithm,identity authentication algorithm and session keys generation algorithm.The protocol combines ID-based password evolvement with Waters signature to guarantee the validity of public key and the reliability of the node's identity.The freshness and security of password are guaranteed by sharing password evolvement every time in node's identity authentication and key agreement.The new protocol enjoys many secure properties such as against dictionary attack,against man-in-middle attack,against replay attack,key independence,forward security,backward security,etc.The analysis shows that the protocol is very suitable for ad hoc network.
作者 李素娟
出处 《计算机与现代化》 2013年第9期183-185,共3页 Computer and Modernization
关键词 ad HOC网 密钥认证 身份认证 密钥协商 ad hoc networks key authentication identity authentication key agreement
  • 相关文献

参考文献14

  • 1McDonald A B,Znati T F.A mobility-based framework for adaptive clustering in wireless ad hoc networks[J].IEEE Journal on Selected Areas in Communications,2006,17(8):1466-1487.
  • 2Zhou L D,Haas Z J.Securing ad hoc networks[J].IEEE Network,1999,13 (6):24-30.
  • 3王海涛 ,刘晓明 .Ad hoc网络的安全问题综述[J].计算机安全,2004(7):26-30. 被引量:6
  • 4Asokan N,Ginzboorg P.Key agreement in ad hoc networks[J].Computer Co mmunications,2000,23(17):1627-1637.
  • 5Ertaul L,Chavan N.Security of ad hoc networks and threshold cryptography[C]//Proceedings of the IEEE 2005 International Conference on Wireless Networks,Communications and Mobile Computing.2005,1:69-74.
  • 6Ertaul L,Lu W M.ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (Ⅰ)[C]// Proceedings of the 4th IFIP-TC6 International Conference on Networking Technologies,Services,and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems.2005:102-113.
  • 7Bellare M,Rogaway P.Entity authentication and key distribution[C]//Proceedings of the 13th Annual Intemational Cryptology Conference on Advances in Cryptology.1994:232-249.
  • 8Bellare M,Pointcheval D,Rogaway P.Authenticated key exchange secure against dictionary attacks[C]//Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques.2000:139-155.
  • 9王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案[J].软件学报,2006,17(8):1811-1817. 被引量:18
  • 10徐静.一个移动Ad Hoc网密钥协商协议的安全分析[J].中国科学院研究生院学报,2008,25(5):611-614. 被引量:1

二级参考文献24

  • 1隋爱芬,杨义先,钮心忻,罗守山.基于椭圆曲线密码的可认证密钥协商协议的研究[J].北京邮电大学学报,2004,27(3):28-32. 被引量:27
  • 2王海涛 ,刘晓明 .Ad hoc网络的安全问题综述[J].计算机安全,2004(7):26-30. 被引量:6
  • 3王化群,张力军,赵君喜.Ad hoc网络中基于环Z_n上椭圆曲线和RSA的密钥管理[J].通信学报,2006,27(3):1-6. 被引量:8
  • 4王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案[J].软件学报,2006,17(8):1811-1817. 被引量:18
  • 5BELLOVIN S, MERRITT M. Encrypted key exchange: Password based protocols secure against dictionary attacks [ C]//Proceedings of 1992 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE Press, 1992:72 -84.
  • 6GONG L. Optimal authentication protocols resistant to password guessing attacks [ C] // Proceedings of the 8th IEEE Workshop on Computer Security Foundations. Piscataway, NJ: IEEE Press, 1995:24 -29.
  • 7BELLARE M, ROGAWAY P. Provably secure session key distribu-tion- The three party case [ C]// Proceedings of the 27th ACM Symposium on Theory of Computing. New York: ACM Press, 1995: 57 - 66.
  • 8LIN HUNLI, SUN HUNGMIN, HWANG T. Three-party encrypted key exchange: attacks and a solution [ J]. Operating Systems Re- view, 2000, 34(4) : 12 -20.
  • 9LIN CHUNLI, SUN HUNGMIN, STEINER M, et al. Three-party encrypted key exchange without server public key [ J]. IEEE Com- munications Letters, 2001,5(12) : 497 -499.
  • 10CHANG C, CHANG Y. A novel three-party encrypted key exchange protocol [J]. Computer Standards and Interfaces, 2004,26(5):471 - 476.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部