期刊文献+

基于身份公钥的移动IP认证方案 被引量:3

A Mobile IP Authentication Protocol Based on Identity
下载PDF
导出
摘要 利用基于身份的公钥系统,设计一个移动IP的认证方案.该方案实现移动IP各实体间的相互认证和可确认的密钥协商,并向移动用户提供匿名服务,保证用户身份和位置信息的机密性.通过对协议的安全性分析,表明该方案满足移动IP的安全需求. A mobile IP authentication protocol was proposed in this paper based on identity-based cryptography. The protocol accomplishes the mutual authentication and key agreement among entities of mobile IP. It can provide anonymous service that guarantees the confidentiality of the mobile user's (identity) and location information. The security the protocol can fulfill the secure requirement of mobile IP.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2005年第3期86-88,共3页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(90204017)
关键词 移动IP 基于身份 密钥协商 mobile Internet protocol identity-based key agreement
  • 相关文献

参考文献6

  • 1WANG Ru chuan, ZHAO Xin ning (Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003, P.R.China).The Research on Mobile-agent Security[J].The Journal of China Universities of Posts and Telecommunications,2002,9(3):47-52. 被引量:7
  • 2Haverinen H, Asokan N, Maattanen T. Authentication and key generation for mobile IP using GSM authentication and roaming[J]. IEEE, 2001 : 2453-2457.
  • 3傅坚.一种基于密钥分发中心的移动IP认证方案[J].计算机工程与应用,2003,39(23):142-144. 被引量:2
  • 4Zao J, Kent S, Gahm F. A public-key based secure mobile IP [J]. Wireless Networks, 1999, 5: 373-390.
  • 5邓所云,胡正名,钮心忻,杨义先.移动通信中的双向认证与密钥协商新协议[J].北京邮电大学学报,2002,25(2):78-82. 被引量:11
  • 6Hess F.Exponent group signature schemes and efficient identity based signature schemes based on pairing[EB/OL]. http://epring. iacr. org, 2002-08.

二级参考文献26

  • 1[1]Horn G,Preneel B.Authentication and payment in future mobile systems[J].In Computer Security ESORICS'98 Proceedings,Springer-Verlag,Berlin: 1998,1 485:277-293.
  • 2[2]Horn G,Martin K M,Mitchell C J.Authentication Protocols for mobile network environment value added services[EB/OL].http:∥isg.rhbnc.sc.uk/c jm/Listofpublications.
  • 3[3]Mehrotra A.Mobility and security management in the GSM system and some proposed future improvements[J].Proceedings of the IEEE,1998,86(7):1 480-1 497.
  • 4[4]Shoup V.On formal modules for secure key exchange[EB/OL].http: ∥www.shoup.net/papers,IBM Research Report RZ 3120,1999.
  • 5[5]Park D G,Boyd C,Moon S J.Forward secrecy and Its Application to Future Mobile Communiations Security[A].PKCS2000,LNCS 1751[C].2000.433-445.
  • 6Perkins C.Mobile IP[J].IEEE Communications Magazine, 1997; 35 (5) : 84-99.
  • 7Perkins C.Mobile IP Joins Forces with AAA[J].IEEE Personal Communications, 2000; 8 : 59-61.
  • 8Haverinen H,Asokan N,Maattanen T.Authentication and Key Generation for Mobile IP Using GSM Authentication and Roaming[J].IEEE, 2001:2453~2457.
  • 9McCann P,Hiller T.An Intemet Infrastructure for Cellar CDMA Networks Using Mobile IP[J].IEEE Personal Communications,2000;8:26-32.
  • 10Bird R,Gopal I,Herzberg A et al.The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution[J].IEEE/ACM Trans on Networking, 1995 ; 3 ( 1 ) :31~41.

共引文献17

同被引文献50

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部