Key Agreement Protocol in Ad-Hoc Networks

WH Lang,MT Zhou,K She
DOI: https://doi.org/10.1109/icct.2003.1209088
2003-01-01
Abstract:This paper proposes a new password-based authenticated two-party DH protocol (PA-DH) as well as the protocol's correctness and security analysis. The key agreement protocol in ad-hoc networks generally consists of two phases: initial key agreement and auxiliary key agreement. According to a specific ad-hoc application, we applied PA-DH to an extended octopus protocol which acts as IKA. This paper also proposes a suit of octopus-based AKA protocols for key updates when membership changes.
What problem does this paper attempt to address?