Anonymous safety communication method applicable to MANET (mobile ad-hoc network) network layer

A secure communication and network layer technology, applied in the field of anonymous secure communication, can solve the problems of reducing security, consuming user memory, and increasing the amount of communication and calculation with certificates, so as to achieve the effect of resisting network attacks and ensuring safe transmission

Inactive Publication Date: 2017-02-22
SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In MANET, AODV (On-demand Distance Vector Routing Protocol) and DSR (Dynamic Source Routing Protocol) routing are the most commonly used on-demand routing protocols, but their problem is that the source node and destination node information and routing In the packet forwarding stage, since the IP addresses of the source node and the destination node are also public in the IP protocol, it is very easy to leak node information
However, the existing problem is that before the communication, the dual communication needs to issue certificates to each other for confirmation, and the maintenance and update of the certificates will increase the amount of communication and calculation
In order to solve the problem of updating fake IDs, MASK requires PKG to provide each user with enough fake IDs and corresponding key sets in advance, but this not only increases the calculation amount of PKG, but also consumes the user's memory
After the fake ID is used up, the user has to reuse it, which also reduces security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous safety communication method applicable to MANET (mobile ad-hoc network) network layer
  • Anonymous safety communication method applicable to MANET (mobile ad-hoc network) network layer
  • Anonymous safety communication method applicable to MANET (mobile ad-hoc network) network layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Below, according to the accompanying drawings, preferred embodiments of the present invention are given and described in detail, so that the functions and features of the present invention can be better understood.

[0049] Such as figure 1 As shown, the anonymous secure communication method applicable to MANET network layer of the present invention mainly includes four steps: S1, system initialization step; S2, shared key negotiation step; S3, route discovery step; S4, data sending step. The detailed process of each step is as follows:

[0050] S1, system initialization step

[0051] Assuming that there is a trusted third-party organization PKG, when the system is initialized, PKG completes the generation of the master key s and the network public parameters G 1 ,G 2 ,q,P,P pub ,H 1 ,H 2 ,H 3 Generation, where the master key is only owned by PKG, and the network public parameters G 1 ,G 2 ,H 1 ,H 2 ,H 3 is made public to all users. In public parameters...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anonymous safety communication method applicable to an MANET (mobile ad-hoc network) network layer. The anonymous safety communication method includes a system initializing step, a shared-key negotiation step, a route discovery step and a data sending step. In the system initializing step, a PKG (private key generator) generates a master key and network public parameters, the master key is kept by the PKG, and the network public parameters are published to all nodes in a network; the PKG generates a public key and a private key both corresponding to each node according to ID (identification) of each node, publishes the public keys to all the nodes and publishes the private keys to the corresponding nodes. In the shared-key negotiation step, negotiation on a shared key and a communication sequence number between a source node and a target node is achieved according to an IBE (identity-based encryption) protocol, and the shared key is a symmetrical key. In the route discovery step, an anonymous route path between the source node and the target node is established according to the negotiated shared key and the negotiated communication sequence number on the basis of an onion encryption protocol. In the data sending step, data transmission from the source node to the target node along the anonymous route path is achieved by the onion encryption protocol. By the anonymous safety communication method, identity information safety, position information safety and route information safety of the nodes in the network can be protected effectively.

Description

technical field [0001] The invention relates to the field of communication network security, in particular to an anonymous security communication method suitable for MANET network layer. Background technique [0002] Mobile ad hoc network (MANET) is suitable for emergency and temporary occasions due to its open wireless communication medium, node mobility and self-organizing characteristics, but it also makes it vulnerable to various security threats and attacks, such as passive Eavesdropping, data tampering and retransmission, false identity and denial of service, etc. Researchers have proposed many corresponding security solutions for the above-mentioned possible attacks, providing security guarantees in terms of confidentiality, integrity, authenticity, availability, and non-repudiation of communication content. [0003] The anonymous security of MANET aims to protect users' private information, and it is receiving more and more attention in important occasions such as m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/02
CPCH04L63/0421H04W12/02
Inventor 潘军马林俞凯
Owner SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products