期刊文献+

一种高效的无线移动网络安全协议 被引量:2

High efficient security protocol for wireless mobile network
下载PDF
导出
摘要 无线移动网络具有节点资源受限的特点,为其设计和实现高效而可靠的安全协议很困难。基于可信第三方和fail-safe协议,提出了一种适合于资源受限网络环境的安全协议。利用SVO逻辑对协议的安全性进行了形式化验证。 Limited resource in wireless mobile network' s nodeed results in very difficult to design and implement an efficient and reliable security protocol. Based on trusted third party and fail-safe protocol, presented a new security protocol which was suitable for the limited resource network environment. The safety of this new security protocol was formally verified using the SVO logic.
出处 《计算机应用研究》 CSCD 北大核心 2007年第11期127-129,142,共4页 Application Research of Computers
基金 武器装备预研资助项目(413150301)
关键词 安全协议 验证 可信第三方 故障—安全协议 移动网络 无线网络 security protocol verification trusted third party fail-safe protocol mobile network wireless network
  • 相关文献

参考文献10

  • 1ANDREW Z.TABONA O.An overview of wireless network security[EB/OL].(2005-08-04).[2005-10-17].http://www.windowsnetworking.com/ pages/article_p.asp?id=421.
  • 2NEEDHAM R,SCHROEDER M.Using encryption for authentication in large networks of computers[J].Communications of the ACM,1978,21(12):993-999.
  • 3AJMANI S,MORRIS R,LISKOV B.A trusted third-party computation service[R].MIT:LCS Publication,2001:1-17.
  • 4GENNARO R,LINDELL Y.A framework for password-based authenticated key exchange[C]//Proc of EUROCRYPT 2003.Heidelberg:Springer-Verlag,2003:524-543.
  • 5ILIEV A,SMITH S.Towards tiny trusted third parties[R].[S.l.]:Dartmouth Computer Science,2005:1-26.
  • 6SCHLICHTING R D,SCHNEIDER F B.Fail-stop processors:an approach to designing fault-tolerant computing systems[J].ACM Transactions on Computing Systems,1983,1(3):222-238.
  • 7GONG L,SYVERSON P F.Fail-stop protocols:an approach to designing secure protocols[C]//Proc of IFIP DCCA-5.Oakland:IEEE Computer Society Press,1985:44-55.
  • 8GARCIA-LUNA-ACEVES J J.A fail-safe routing algorithm for multihop packet-radio networks[C]//Proc of IEEE INFORCOM'86.Miami:IEEE Computer Society Press,1986:120-132.
  • 9SYVERSON P F,OORSCHOT P C van.On unifying some cryptographic protocol logics[C]//Proc of IEEE Computer Society Symposium on Research in Security and Privacy.Los Alamitos,Calif:IEEE Computer Society Press,1994:14-28.
  • 10SYVERSON P F,OORSCHOT P C van.A unified cryptographic protocol logic[R].Washington D C:NRL Publication,1996:1-29.

同被引文献7

  • 1高惠燕,李忠成.基于NRF24E1芯片的组网技术研究与实现[J].电子技术应用,2007,33(5):97-100. 被引量:2
  • 2[美]Rashinkar,P.系统芯片(SoC)验证方法与技术(System-on-a-chip verfication methodology and techniques)[M].孙海平,丁键,译.北京:电子工业出版社,2005.
  • 3J.Clark,J.Jacob.A survey of authentication protocol literature[K].wwwcsyorkacuk/~jac/papers/drareviewpsgz.2007
  • 4G.Low.Breading and fixing the Needham-Schroeder public-key authentication protocol[].Information Processing Letters.1995
  • 5Needham R,Schroeder M.Using encryption for authentication in large networks of computers[].Communications of the ACM.1978
  • 6Denning DE,Sacco GM.Timestamps in key distribution protocols[].Communications of the ACM.1981
  • 7Woo T Y C,Lam S S.Authentication for Distributed Systems[].IEEE Computer.1992

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部