期刊文献+

可证明安全的异构无线网络认证协议 被引量:9

Provably secure authentication protocol for heterogeneous wireless networks
下载PDF
导出
摘要 异构无线网络中互连的安全问题是当前研究的关注点,针对3G网络和WLAN(无线局域网)所构成的异构互连网络中认证协议的安全和效率问题,提出了一种基于离线计费方法的认证协议。该协议通过对WLAN服务网络身份进行验证,抵御了重定向攻击的行为;采用局部化重认证过程,减少了认证消息的传输延时,提高了认证协议的效率。仿真结果表明,该协议的平均消息传输延时相对于EAP-AKA协议缩短了大约一半。通过Canetti-Krawczyk(CK)安全模型对新协议进行了安全性证明,证明该协议具有SK-secure安全属性。 Security of heterogeneous wireless networks has attracted the attention of researchers. Considering security and efficiency problems on EAP-AKA protocol in the 3G-WLAN interworking networks, an authentication protocol based on a way of offfine billing was proposed. It verified the identity of WLAN access network to prevent the re-direction attack, and used the localized authentication mechanism to reduce the message transmission delay and improve the efficiency of reauthentication process. Simulation results show that the average message transmission delay of the proposed protocol is about half shorter than that of EAP-AKA. By analyzing the security of the proposed protocol with Canetti-Krawczyk (CK) model, it proves that the proposed protocol satisfy the definition of Session Key security defined in the CK model.
出处 《通信学报》 EI CSCD 北大核心 2007年第11期21-29,共9页 Journal on Communications
基金 国家自然科学基金资助项目(60633020 60573036) 北京电子科技学院信息安全与保密重点实验室资助项目(KYKF200604)~~
  • 相关文献

参考文献10

  • 13GPP TS 22.934 Feasibility Study on 3GPP System to Wireless Local Area Network (WLAN) Interworking (Release 6)[S]. Valbonne : 3GPP TSG SA, 2003.
  • 23GPP TS 33.234 Wireless Local Network(WLAN) Interworking Security[S]. Valbonne: 3GPP, 2005.
  • 3朱红儒,肖国镇.基于整个网络的3G安全体制的设计与分析*[J].通信学报,2002,23(4):117-122. 被引量:12
  • 4KRAWCZYK H, BELLARE M, CANELTI R. RFC 2104 HMAC: Keyed-Hashing for Message Authentication[S]. 1997.
  • 5CHEN Y C, HAO C K, YANG Y W. 3G and WLAN interworking security: current status and key issues[J]. International Journal of Network Security, 2006, 2(1 ): 1 - 13.
  • 6CANETI'I R, KRAWCZYK H. Analysis of key-exchange protocols and their use for building secure channels[A]. Advances in Cryp- tology-Eurocrypt 2001, LNCS 2045[C]. Springer-Verlay, 2001. 453-474.
  • 7BELLARE M, ROGAWAY E Entity authenticaion and key distribution[A]. CRYPTO'93[C]. Springer-Verlag, 1994. 232-249.
  • 8GOLDREICH O. Foundations of Cryptography:Basic Tools[M]. Cambridge University Press, 2001.
  • 9GOLDWASSER S, MICALI S. Probabilistic encryption[J]. Journal of Computer and System Science, 1984, 28: 270-299.
  • 10TIN Y S T, BOYD C. Provably secure key exchange: an engincedng approach[A]. Australasian Information Security Workshop Conference on ACSW Frontiers[C]. 2003.

二级参考文献10

  • 1RFC-2451.The ESP CBC-Mode Cipher Algorithms[S].
  • 2RFC-2412.The OAKLEY Key Determination Protocol[S].
  • 3RFC-2409.The Internet Key Exchange (IKE)[S].
  • 43G TR 33.900.A Guide to 3G Security[S].
  • 53G TS 33.102 .3G Security ,Security Architecture[S].
  • 63G TS 33.103,version 3.2.0.Integration Guidelines[S].
  • 73G TS 23.002.Network Architecture[S].
  • 83G TS 33.105.3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Cryptographic Algorithm Requirements[S].
  • 9ISO/IEC 11770-3.Key Management - Mechanisms Using Asymmetric Techniques[S].
  • 10VARADHARAJAN V,MU Y.Preserving privacy in mobile communications: a hybrid method[A].IEEE Proc International Conference on Personal Communications ICPWC'97[C].1997.532-536.

共引文献11

同被引文献56

引证文献9

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部