Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2008, Vol. 25 ›› Issue (5): 615-619.DOI: 10.7523/j.issn.2095-6134.2008.5.007

• 论文 • Previous Articles     Next Articles

UCKG-based key management protocol

Yang Fu-Rong , Liu Chang-Jin   

  1. Department of Information security , University of Science and Technology of China, Hefei 230027, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-09-15

Abstract: Key management protocol is a key problem for Ad hoc network security. In this paper, we introduced a user contributed key generation strategy (UCKG) based on the identity based cryptography (IBC). Compared to IBC key generation strategy, UCKG has no PGC-cheating problem and no requirement of secure channel for key distribution. We also proposed a distributed key management protocol for UCKG and simulated it with NS-2. The simulation results show that while the network had the good connectivity, the distributed key management protocol has good performance.

Key words: Ad hoc networks, key management, Identity based cryptography