期刊文献+

可证明安全的基于802.11i的漫游认证协议 被引量:3

An 802.11i Robust Security Network Authentication Protocol of Roaming
下载PDF
导出
摘要 随着802.11无线局域网的发展,漫游已经成为它的重要场景.身份认证是保证网络安全的重要措施之一,802.11WLAN中现有的认证协议不能有效地支持漫游.作者提出的基于DH交换的认证协议,不仅满足了漫游对认证协议的特殊要求身份保护和认证时延,而且具有可证明的安全性和必需的安全性质. With the development of 802.11 wireless local area network(WLAN), roaming has become an important scenario. Based on DH exchange, an authentication protocol is proposed.This protocol not only guarantees the confidentiality of user's identity and decreases the roundtrips of the authentication message but also provides provably security and necessary security attributes. As a result the protocol conforms to the requirements for performance and security in roaming scenario of WLAN.
出处 《计算机学报》 EI CSCD 北大核心 2005年第12期2027-2035,共9页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2002AA143021) 国家自然科学基金(90204012) 2002教育部优秀青年教师资助计划资助.
关键词 无线局域网 漫游 身份保护 可证明安全 WLAN roaming identity protection provably security
  • 相关文献

参考文献8

  • 1Song B.,Kim K.Two-pass authenticated key agreement protocol with key confirmation.In:Proceedings of Cryptology INDOCRYPT 2000,Lecture Notes in Computer Science 1977.Springer-Verlag,2000,237~249
  • 2Blumental Uri,Buddhikot Milind M.,Garay Juan A.et al.A scheme for authentication and dynamic key exchange in wireless networks.Bell Labs Technical Journal,2002,7(2):37~48
  • 3Aboba B.,Simon D.PPP EAP TLS Authentication Protocol.RFC 2716,1999
  • 4Canetti R.,Krawczyk H.Security analysis of IKE's signaturebased key-exchange protocol.In:Proceedings of the Crypto' 2002,Lecture Notes in Computer Science 2442.Springer-Verlag,2002,143~161
  • 5Canetti R.,Krawczyk H.Analysis of key-exchange protocol and their use for building secure channels.In:Proceedings of Eurocrypt 2001,Lecture Notes in Computer Science 2045.Springer-Verlag,2001,453~474
  • 6Haverinen H.,Salowey J.EAP SIM Authentication.IETF draft-haverinen-pppext eap-sim-16.txt,DEC 2004
  • 7Funk P.,Blake-Wilson S.EAP Tunneled TLS Authentication Protocol(EAP-TTLS).draft-ietf-pppext-eap-ttls-05.txt.July 2004
  • 8Josefsson S.,Palekar A.,Simon D.,Zorn G.Protected EAP Protocol(PEAP).IETF draft-josefsson pppext-eap-tls-eap-10,October 2004

同被引文献11

  • 1李兴华,马建峰.中国无线局域网安全标准认证机制的改进[J].计算机研究与发展,2006,43(z2):520-524. 被引量:1
  • 2汪雁,黄本雄,张帆,朱慧媛.IEEE802.11性能评估和改进[J].小型微型计算机系统,2004,25(12):2226-2231. 被引量:2
  • 3王英丽,王东立,何晓东.IEEE 802.11系列标准[J].信息技术,2005,29(5):96-97. 被引量:5
  • 4Zhang Yanchao, Fang Yuguang.ARSA: an attack-resilient security architecture for multihop wireless mesh networks[J].IEEE Journal on Selected AREAS in Communications,2006,24(10).
  • 5Tuladhar S R,Caicedo C E,Joshi J B D.lnter-domain authentication for seamless roaming in hdterogeneous wireless networks[C]// 2008 IEEE International Conference on Sensor Networks, Ubiquitous,and Trustworthy Computing,2008.
  • 6Rong Bo, Qian Yi,Lu Kejie, et al.Mobile-agent-based handoff in wireless mesh networks: architecture and call admission control[J]. IEEE Transactions on Vehicular Technology, 2009,58(8).
  • 7李亚晖,李凤华,杨卫东,马建峰.可证明安全的异构无线网络认证协议[J].通信学报,2007,28(11):21-29. 被引量:9
  • 8Song B,Kim K.Two pass authenticated key agreement protocol with key confirmation. Proceedings of Cryptology IN DOCRYPT2000 . 2000
  • 9Giuseppe Bianchi.Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications . 2000
  • 10曹春杰,杨超,马建峰,朱建明.WLAN Mesh漫游接入认证协议[J].计算机研究与发展,2009,46(7):1102-1109. 被引量:15

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部