Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 380-382.

• Information Security • Previous Articles     Next Articles

New Identity-based Authentication and Key Agreement Scheme in Ad hoc Networks

HUO Shi-wei,ANG Wen-jing,LI Jing-zhi,SHEN Jin-shan   

  1. Institute of Information and Communications,National University of Defense Technology,Xi’an 710106,China
    Xi’an Communications Institute,Xi’an 710106,China
  • Online:2018-06-20 Published:2018-08-03

Abstract: The available identity-based authentication and key agreement schemes in Ad hoc networks are based on bilinear pairing with high computation cost,and the schemes also have the problem of key escrow.Considering the problem,a new identity-based authentication and key agreement scheme was proposed.Identity authentication was realized using identity-based signature without bilinear pairing.The session key was established using diffie-hellman key exchange technology.It is shown that the proposed scheme avoids the problem of key escrow,and has higher efficiency.

Key words: Ad hoc networks, Authentication, Identity-based cryptography, Key agreement

CLC Number: 

  • TP309
[1]ZHOU L,HAAS Z.Securing Ad Hoc Networks[J].Microcomputer Applications,2005,13(6):24-30.
[2]YI S,KRAVETS R.MOCA:MObile Certificate Authority for Wireless Ad Hoc Networks[C]∥Pki Research Workshop Program.2004:65-79.
[3]SEN J,SUBRAMANYAM H.An Efficient Certificate Authority for Ad Hoc Networks[M]∥Distributed Computing and Internet Technology.Springer Berlin Heidelberg,2007:97-109.
[4]吴平,王保云,徐开勇.基于身份的Ad Hoc网络密钥管理方案[J].计算机工程,2008,34(24):143-145.
[5]施荣华,樊翔宇.基于身份认证的Ad Hoc密钥协商方案[J].中南大学学报(自然科学版),2010,41(6):2236-2239.
[6]DU H Z,WEN Q Y.Efficient traceable identity-based signature scheme[J].Journal on Communications,2009,30(8):56-61.
[7]杜红珍,温巧燕.高效的可追踪的基于ID的签名方案[J].通信学报,2009,30(8):56-61.
[8]周福才,徐剑,徐海芳,等.Ad hoc网络中基于双线性配对的STR组密钥管理协议研究[J].通信学报,2008,29(10):117-125.
[1] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[2] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
[3] LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362.
[4] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[5] WANG Xiang-yu, YANG Ting. Routing Directory Server Defined by Smart Contract [J]. Computer Science, 2021, 48(6A): 504-508.
[6] CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190.
[7] LIAN Wen-juan, ZHAO Duo-duo, FAN Xiu-bin, GENG Yu-nian, FAN Xin-tong. CFL_BLP_BC Model Based on Authentication and Blockchain [J]. Computer Science, 2021, 48(11): 36-45.
[8] NI Liang, WANG Nian-ping, GU Wei-li, ZHANG Qian, LIU Ji-zhao, SHAN Fang-fang. Research on Lattice-based Quantum-resistant Authenticated Key Agreement Protocols:A Survey [J]. Computer Science, 2020, 47(9): 293-303.
[9] WU Yu-hong and HU Xiang-dong. Study on Security of Industrial Internet Network Transmission [J]. Computer Science, 2020, 47(6A): 360-363.
[10] MO Tian-qing and HE Yong-mei. SIP Authentication Key Agreement of Protocol Based on Certificateless [J]. Computer Science, 2020, 47(6A): 413-419.
[11] CHEN Meng-dong, GUO Dong-sheng, XIE Xiang-hui, WU Dong. Design and Implementation of Rule Processor Based on Heterogeneous Computing Platform [J]. Computer Science, 2020, 47(4): 312-317.
[12] ZHAO Nan,ZHANG Guo-an. Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET [J]. Computer Science, 2020, 47(3): 312-319.
[13] LI Zhao-bin, CUI Zhao, WEI Zhan-zhen, ZHAO Hong, GUO Chao. Wireless Network Authentication Method Based on Physical Layer Channel Characteristics [J]. Computer Science, 2020, 47(12): 267-272.
[14] WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9.
[15] CHENG Qing-feng, LI Yu-ting, LI Xing-hua, JIANG Qi. Research on Application of Cryptography Technology for Edge Computing Environment [J]. Computer Science, 2020, 47(11): 10-18.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!