Computer Engineering and Applications ›› 2013, Vol. 49 ›› Issue (1): 120-123.

Previous Articles     Next Articles

Identity-based password authentication scheme for Ad hoc networks

XU Huiyan, WU Keli, SUN Qingying   

  1. School of Computer Science and Technology, Huaiyin Normal University, Huai’an, Jiangsu 223300, China
  • Online:2013-01-01 Published:2013-01-16

无线自组网中基于身份的口令认证方案

徐会艳,吴克力,孙庆英   

  1. 淮阴师范学院 计算机科学与技术学院,江苏 淮安 223300

Abstract: This paper binds password and identity using the digital signature to prevent the impersonation attack from malicious nodes, and resists repudiation of internal nodes. The scheme uses forward hash chains to update password, and decreases node’s computational load and storage requirements. The proposed schema generates a session key with Diffie-Hellman key exchange protocol, it reduces the probability of attack due to prolonged storage of key.

Key words: password, Ad hoc, authentication, key

摘要: 利用数字签名将口令与节点身份绑定,防止了恶意节点假冒合法节点的攻击,以及内部节点的抵赖行为的发生。该方案采用前向哈希链的思想进行口令更新,减轻了节点的计算开销和存储开销。利用Diffie-Hellman密钥交换方法产生会话密钥,减小了因长时间存储密钥而遭受攻击的机率。

关键词: 口令, 无线自组网, 认证, 密钥