DocumentCode
1597699
Title
Key agreement protocol in ad-hoc networks
Author
Lang, Wenhua ; Zhou, Mingtian ; She, Kun
Author_Institution
Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Volume
1
fYear
2003
Firstpage
296
Abstract
This paper proposes a new password-based authenticated two-party DH protocol (PA-DH) as well as the protocol´s correctness and security analysis. The key agreement protocol in ad-hoc networks generally consists of two phases: initial key agreement and auxiliary key agreement. According to a specific ad-hoc application, we applied PA-DH to an extended octopus protocol which acts as IKA. This paper also proposes a suit of octopus-based AKA protocols for key updates when membership changes.
Keywords
ad hoc networks; authorisation; computer networks; cryptography; protocols; AKA protocols; ad-hoc networks; authenticated two-party DH protocol; correctness analysis; extended octopus protocol; key agreement protocol; security analysis; Ad hoc networks; Application software; Computer networks; DH-HEMTs; Intelligent networks; Paper technology; Protocols; Public key; Security; Wireless communication;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication Technology Proceedings, 2003. ICCT 2003. International Conference on
Print_ISBN
7-5635-0686-1
Type
conf
DOI
10.1109/ICCT.2003.1209088
Filename
1209088
Link To Document