Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2007, Vol. 30 ›› Issue (5): 82-85.doi: 10.13190/jbupt.200705.82.348

• Papers • Previous Articles     Next Articles

Conversation Keys Scheme Bases ID and Evolved Passwords in Ad hoc Network

YUAN Zheng1,2, WEN Qiao-yan2, CHEN Rui-li1, ZHANG Hua2   


  1. (1. Department of Information Security,Beijing Electronic Science and Technology Institute, Beijing 100070,China;
    2. School of Science, Beijing University of Posts and Telecommunications, Beijing100876,China)
  • Received:2007-02-08 Revised:2007-04-02 Online:2007-10-30 Published:2007-10-30
  • Contact: YUAN Zheng

Abstract:

A practicable and secure conversation keys scheme for Ad hoc network is presented. The scheme is composed of system initialization with the help of identity-based(ID-based)and evolved passwords algorithm, nodes’ identity authenticated algorithm and conversation keys algorithm. In the nodes’ identity authenticated algorithm and the conversation keys algorithm, the ID-based passwords can reduce the computational complexity and interactive times. Additionally, the evolved passwords and random value means that the same nodes have different passwords, different keys pairs and different conversation keys during every communications. The scheme applies to the Ad hoc network also because the conversation keys don’t depend on any node. The scheme is secure against dictionary attack and types of key attacks.

Key words: Ad hoc network, identity, evolved password, conversation keys

CLC Number: