Title :
Key agreement protocol in ad-hoc networks
Author :
Lang, Wenhua ; Zhou, Mingtian ; She, Kun
Author_Institution :
Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Abstract :
This paper proposes a new password-based authenticated two-party DH protocol (PA-DH) as well as the protocol´s correctness and security analysis. The key agreement protocol in ad-hoc networks generally consists of two phases: initial key agreement and auxiliary key agreement. According to a specific ad-hoc application, we applied PA-DH to an extended octopus protocol which acts as IKA. This paper also proposes a suit of octopus-based AKA protocols for key updates when membership changes.
Keywords :
ad hoc networks; authorisation; computer networks; cryptography; protocols; AKA protocols; ad-hoc networks; authenticated two-party DH protocol; correctness analysis; extended octopus protocol; key agreement protocol; security analysis; Ad hoc networks; Application software; Computer networks; DH-HEMTs; Intelligent networks; Paper technology; Protocols; Public key; Security; Wireless communication;
Conference_Titel :
Communication Technology Proceedings, 2003. ICCT 2003. International Conference on
Print_ISBN :
7-5635-0686-1
DOI :
10.1109/ICCT.2003.1209088