期刊文献+

无线认证协议Server-specific MAKEP的一种改进 被引量:2

Improvement of wireless authentication protocol:server-specific MAKEP
下载PDF
导出
摘要 无线认证协议用于无线环境中各参与方之间相互确定对方的真实身份,防止假冒攻击。如果无线认证协议出现安全漏洞,整个会话就没有安全性可言,还会影响随后会话的安全性。针对无线认证协议Server-spec ificM AKEP存在的认证性缺陷,给出了对协议的一种改进。对改进后的协议进行模型检验分析的结果表明,改进后的Server-spec ific M AKEP协议满足认证性和保密性。此外,把存储空间的占用从移动装置转移到了固定装置,减少了移动装置存储空间的占有率,从而提高了移动装置的通信效率。 Wireless authentication protocols are used to confirm identity of the participants involved in case of impersonation. If there are security flaws in a wireless authentication protocol, the whole session will be unsafe or even the security of the subsequent session will be affected. For the authentication flaw in wireless authentication protocol Server-specific MAKEP, an improvement is presented, The improved protocol is analyzed using model checking and the result shows that the improved Server-specific MAKEP guarantees authentication and confidentiality. In addition, the improvement transfers the storage occupation from mobile device to fixed device. Thus, it reduces the storage occupation of mobile device and enhances the communication efficiency of mobile device.
作者 刘霞 古天龙
出处 《桂林电子工业学院学报》 2006年第4期255-258,共4页 Journal of Guilin Institute of Electronic Technology
关键词 无线认证协议 认证性 模型检验 wireless authentication protocol authentication model checking
  • 相关文献

参考文献5

  • 1SHIM K,LEE YOUNG-RAN.Security flaws in authentication and key establishment protocols for mobile communications[J].Applied Mathematics and Computation,2005,169(1):62-74.
  • 2DAS M L,SAXENA A.SPAM:Secure protocol for authentication in mobile-communications[C].//Proceedings of the International Conference on Mobile Business,2005:23-27.
  • 3WONG D S,CHAN A H.Mutual authentication and key exchange for low power wireless communications[C].//Military Communications Proceedings Communications for Network-Centric Operations:Creating the Information Force,2001:39-43.
  • 4SHIM K.Cryptanalysis of mutual authentication and key exchange for low power wireless communications[J].IEEE Communications Letters,2003,7(5):248-250.
  • 5MCMILLAN K L.Symbolic model checking[M].Klu-wer Academic Publishers,1993.

同被引文献5

  • 1Thayer F J,Herzog J C,Guttman J D.Strand spaces:Proving security protocols correct[J].Journal of Computer Security,1999,7(2,3):191-230.
  • 2Thayer F J,Herzog J C,Guttman J D.Strand spaces:Honest ideals on strand spaces[C]//Proceedings of the 1998 IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,1998:66-77.
  • 3THAYER F J, HERZOG J C, GUTTMAN J D. Strand spaces: Proving security protocols correct[J] .Journal of Computer Security, 1999, 7(2/3): 191 -230.
  • 4JAVIER T F, JONATHAN C H, JOSHUA D. Guttman. Authentication tests[C]//Proc, of 2000 IEEE Symposium on Security and Privacy. Oakland CA: IEEE Computer Society Press, 2000: 96-109.
  • 5THAYER F J, HERZOG J C, GUTTMAN J D. Strand spaces: Honest ideals on strand spaces[C]//Proceedings of the 1998 IEEE Computer Security Foundations Workshop. Los Alamitos: 1EEE Computer Society Press, 1998:66-77.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部