{"title":"基于离散对数的无线分布式网络密钥协议","authors":"Lianfeng Huang, Yuexin Weng, Runfii Zhang","doi":"10.1109/ICASID.2010.5551482","DOIUrl":null,"url":null,"abstract":"Because of the limited processing ability of wireless distributed network devices, most of the equipment are using symmetric encryption algorithm to encrypt the data, both communications need a shared secret key and it should be changed regularly in the service. But the key agreement process is vulnerable to eavesdropping attack, modification attack, man-in-the-middle attack, and so on. This paper proposes a wireless distributed network key agreement protocol based on discrete logarithm problem. It is used to prevent above attacks.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Wireless distributed network key-agreement protocol based on discrete logarithm\",\"authors\":\"Lianfeng Huang, Yuexin Weng, Runfii Zhang\",\"doi\":\"10.1109/ICASID.2010.5551482\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Because of the limited processing ability of wireless distributed network devices, most of the equipment are using symmetric encryption algorithm to encrypt the data, both communications need a shared secret key and it should be changed regularly in the service. But the key agreement process is vulnerable to eavesdropping attack, modification attack, man-in-the-middle attack, and so on. This paper proposes a wireless distributed network key agreement protocol based on discrete logarithm problem. It is used to prevent above attacks.\",\"PeriodicalId\":391931,\"journal\":{\"name\":\"2010 International Conference on Anti-Counterfeiting, Security and Identification\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Anti-Counterfeiting, Security and Identification\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASID.2010.5551482\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Anti-Counterfeiting, Security and Identification","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2010.5551482","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Wireless distributed network key-agreement protocol based on discrete logarithm
Because of the limited processing ability of wireless distributed network devices, most of the equipment are using symmetric encryption algorithm to encrypt the data, both communications need a shared secret key and it should be changed regularly in the service. But the key agreement process is vulnerable to eavesdropping attack, modification attack, man-in-the-middle attack, and so on. This paper proposes a wireless distributed network key agreement protocol based on discrete logarithm problem. It is used to prevent above attacks.