期刊文献+

基于可信第三方的快速域间垂直切换认证协议 被引量:1

A Trusted Third-party Based Fast Authentication Protocol for Inter-domain Vertical Handover
下载PDF
导出
摘要 针对异构无线网络中的域间垂直切换,提出一种基于可信第三方的切换认证和密钥协商协议,协议分别考虑了向上切换和向下切换两种切换场景.文中还改进了一种三方密钥分配协议,用于实现域间垂直切换认证过程中的临时密钥分配.分析比较表明,该方案在安全和性能上具有较好的折中性. One of the main characteristics of heterogeneous wireless network convergence is inter-domain vertical handover (VHO). The authentication and key agreement is the key to successful inter-domain VHO. Focusing on the inter-domain VHO of heterogeneous wireless network, a trusted third-party (TTP) based handover authentication and key agreement protocol was proposed. Two handover scenarios were considered in the protocol, namely upward VHO and downward VHO. Also a three party key distribution protocol was improved and used to distribute the temporary key during inter-domain VHO. The analysis and comparisons show that the protocol is a good trade-off between the security and performance.
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2007年第6期934-938,943,共6页 Journal of Shanghai Jiaotong University
基金 国家自然科学基金资助项目(60372076)
关键词 域间垂直切换 异构无线网络 认证和密钥协商 inter-domain vertical handover heterogeneous wireless network authentication and key agreement
  • 相关文献

参考文献9

  • 1Wang H, Prasad A R. Security context transfer in vertical handover[C]//Gong K, Niu Z. Proc of the 14th International Symposium on Personal, Indoor and Mobile Radio Communication. Beijing: IEEE, 2003.2775-2779.
  • 2Wang H, Prasad A R. Fast authentication for inter-domain handover [C]//Souza J N. In 11th International Conference on Telecommunications. Fortaleza, Brazil: Springer-Verlag, 2004.973-982.
  • 3Soltwisch R, Fu X, Hogrefe D, et al. A method for authentication and key exchange for seamless inter-domain handovers [C]//Lawrence W C. Proc of the 12th IEEE International Conference on Networks. Singa-pore: IEEE, 2004.463-469.
  • 4Akyildiz I F, Mohanty S, Jiang X. A ubiquitous mobile communication architecture for next-generation heterogeneous wireless systems [J]. IEEE Communications Magazine, 2005,43(6):S29-S36.
  • 5Choo K R, Boyd C, Hitchcock Y, et al. On session identifiers in provably secure protocols: The Bellare-Rogaway three-party key distribution protocol revisited [C]//Blundo C, Cimato S. Security in Communication Networks: The 4th International Conference. Amalfi, Italy: Springer-Verlag,2005.351-366.
  • 6Choo K R, Hitchcock Y. Security requirements for key establishment proof models : Revisiting Bellare-Ro- gaway and Jeong-Katz-Lee protocols [C]//Boyd C, Gonzalez Nieto J M. Information Security and Privacy: 10th Australasian Conference. Brisbane, Australia: Springer-Verlag, 2005.429-442.
  • 7Bellare M, Rogaway P. Provably secure session key distribution the three party case [C]//Leighton T F, Borodin A. In 27th ACM Symposium on Theory of Computing. New York: ACM,1995.57-66.
  • 8Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels [C]//Pfitzmann B. In Advances in Cryptology-Euro-crypt 2001. Heidelberg: Springer-Verlag,2001.453-474.
  • 9Song B, Kim K. Two-pass authenticated key agree-ment protocol with key confirmation [C]//Roy B, Okamoto E. Proc of Indoerypt 2000. Heidelberg: Springer-Verlag, 2000.237-249.

同被引文献11

  • 1何建波,卿斯汉,王超.对一类多级安全模型安全性的形式化分析[J].计算机学报,2006,29(8):1468-1479. 被引量:10
  • 2U S Department of Defense.Rep DOD 5200 28-STD Dep de- fense trusted computer system evaluation criteria[S].1985.
  • 3Lu Wen-Pai, Sundareshan M K.A model for multilevel security in computer networks[J].IEEE Transactions on Software Engi- neering, 1990, 16(6) : 647-659.
  • 4Varadharajan V.A multilevel security policy model for networks[C]// Proceedings of IEEE INFOCOM' 90, San Francisco, US, 1990: 710-718.
  • 5Koodli R.RFC5268 Mobile IPv6 fast handovers[S].IETF,2008.
  • 6Song Mei,Wang Li,Song Junde.A secure fast handover scheme based on AAA protocol in mobile IPv6 networks[J].The Journal of China Universities of Posts and Telecommunications, 2008,15:14-18.
  • 7Panja B,Madria S K,Bhargava B.A role-based access in a hier- archical sensor network architecture to provide multilevel securi- ty[J].Computer Communications,2008,31:793-806.
  • 8Winjum E, Berg T J.Multilevel security for IP routing[C]//MIL- COM, 2008.
  • 9Burns J G.Multilevel system security and interoperability between differently classified networks[C]//SPIE, 1998,3577 : 188-199.
  • 10Braghin C,Cortesi A,Focardi R.Security boundaries in mobile ambients[J].Compnter Languages,Systems and Structures,2002, 28: 101-127.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部