基于口令认证的移动Ad Hoc网密钥协商方案
DOI:
作者:
作者单位:

作者简介:

通讯作者:

中图分类号:

基金项目:

Supported by the National Natural Science Foundation of China under Grant No.60273089 (国家自然科学基金); the National High-Tech Research and Development Plan of China under Grant No.2003AA1Z2560 (国家高技术研究发展计划(863)); the Shanxi Province Natural Science Foundation Research Plan of China under Grant No.2005F02 (陕西省自然科学基础研究计划); the Science and Technology Innovation Foundation of Xi'an University of Technology of China under Grant No.108210402 (西安理工大学科技创新基金)


A Key Agreement Scheme for Mobile Ad Hoc Networks Based on Password Authentication
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.基于ECC(elliptic curves cryptography),提出了一个新的适用于Ad Hoc网的具有口令认证和共享口令进化的多方密钥协商方案.口令的一个功能是作为共享信息认证移动节点的密钥,另一个功能是作为对称密钥加密移动节点间的交互信息.共享口令进化机制保证每次认证节点密钥和协商会话密钥时口令的新鲜性和安全性,从而既减轻了移动节点的计算量和存储负担,又实现了移动节点之间的密钥认证和信息加密.新方案具有抗中间人攻击、抗重放攻击、密钥独立和前向安全等多种安全特性.

    Abstract:

    As a new type of wireless mobile networks, Ad Hoc networks do not depend on any fixed infrastructure, and have no centralized control unit and so its computation capabilities are limited by mobile nodes. In this paper, a novel multi-party key agreement scheme with password authentication and sharing password evolvement for Ad Hoc networks is proposed based on ECC (elliptic curves cryptography). One of the functions of passwords is used as sharing information to authenticate the mobile node’s secret keys, and the other is used as a symmetrical key to encrypt alternating information between mobile nodes. The freshness and security of passwords are guaranteed by sharing password evolvement every time in mobile node’s secret keys authentication and key agreement. Consequently, the computational overheads and the store load of mobile nodes are lessened, moreover, secret keys authentication and information encryption between mobile nodes are provided. The new scheme enjoys many secure properties such as against man-in-the-middle attack, against replay attack, key independence, forward security, etc.

    参考文献
    相似文献
    引证文献
引用本文

王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案.软件学报,2006,17(8):1811-1817

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2005-06-02
  • 最后修改日期:2005-10-10
  • 录用日期:
  • 在线发布日期:
  • 出版日期:
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号