• DocumentCode
    1597699
  • Title

    Key agreement protocol in ad-hoc networks

  • Author

    Lang, Wenhua ; Zhou, Mingtian ; She, Kun

  • Author_Institution
    Univ. of Electron. Sci. & Technol. of China, Chengdu, China
  • Volume
    1
  • fYear
    2003
  • Firstpage
    296
  • Abstract
    This paper proposes a new password-based authenticated two-party DH protocol (PA-DH) as well as the protocol´s correctness and security analysis. The key agreement protocol in ad-hoc networks generally consists of two phases: initial key agreement and auxiliary key agreement. According to a specific ad-hoc application, we applied PA-DH to an extended octopus protocol which acts as IKA. This paper also proposes a suit of octopus-based AKA protocols for key updates when membership changes.
  • Keywords
    ad hoc networks; authorisation; computer networks; cryptography; protocols; AKA protocols; ad-hoc networks; authenticated two-party DH protocol; correctness analysis; extended octopus protocol; key agreement protocol; security analysis; Ad hoc networks; Application software; Computer networks; DH-HEMTs; Intelligent networks; Paper technology; Protocols; Public key; Security; Wireless communication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication Technology Proceedings, 2003. ICCT 2003. International Conference on
  • Print_ISBN
    7-5635-0686-1
  • Type

    conf

  • DOI
    10.1109/ICCT.2003.1209088
  • Filename
    1209088