Identity Based Dynamic Key Management of Airborne Ad Hoc Network

被引:0
|
作者
Wang Hong [1 ,2 ]
Li Jianhua [1 ]
Lai Chengzhe [3 ]
机构
[1] Air Force Engn Univ, Informat & Nav Coll, Xian 710077, Shaanxi, Peoples R China
[2] Natl Univ Def Technol, Informat & Commun Coll, Xian 710106, Shaanxi, Peoples R China
[3] Xian Univ Posts & Telecommun, Xian 710121, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Airborne network; Identity-based cryptography; Key management; Self-organized; Distributed;
D O I
10.11999/JEIT171148
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Because of nowadays airborne network's updating difficulty of pre-allocated symmetrical key, high communication cost of public key certificate and the requirement of security channel for distributed identity based key management, identity-based dynamic key management of airborne network is proposed. It is composed of two algorithms: self-organized generation of master key without the trusted third party and distributed management of user's private key. Moreover, the master key share and user private partition can be delivered without the pre-established security channel by blinding them so that the scheme is easy to develop and flexible to extend. Finally, the correctness and security of the proposed scheme are proved, it is shown that it can provide the ability to resist the impersonation attack, replay attack and man-in-the-middle attack.
引用
下载
收藏
页码:1985 / 1991
页数:7
相关论文
共 20 条
  • [1] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [2] [曹丹 Cao Dan], 2011, [电子与信息学报, Journal of Electronics & Information Technology], V33, P2922
  • [3] Self-organized public-key management for mobile ad hoc networks
    Capkun, S
    Buttyán, L
    Hubaux, JP
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) : 52 - 64
  • [4] DATKO B., 2002, SUPPORTING SECURE AD
  • [5] Providing distributed certificate authority service in cluster-based mobile ad hoc networks
    Dong, Y.
    Sui, Ai-Fen
    Yiu, S. M.
    Li, Victor O. K.
    Hui, Lucas C. K.
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2442 - 2452
  • [6] Han Lei, 2011, Journal of Sichuan University, V43, P133
  • [7] Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks
    Janani, V. S.
    Manikandan, M. S. K.
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2016, 41 (10): : 1135 - 1154
  • [8] Jie Li, 2015, J COMMAND CONTROL, V1, P351
  • [9] Li Hui-xian, 2010, Journal on Communications, V31, P112
  • [10] 机载网络体系结构及其协议栈研究进展
    梁一鑫
    程光
    郭晓军
    周爱平
    [J]. 软件学报, 2016, 27 (01) : 96 - 111