期刊文献+

基于混沌算法的无线安全认证技术研究 被引量:3

Study on Authentication of Information Security in Wireless LAN Based on Chaos Algorithm
下载PDF
导出
摘要 针对无线网络安全威胁,提出了一种基于混沌算法的无线安全认证方案,利用混沌对初始条件的依赖性可以生成混沌序列,以此作为无线用户的身份,这种身份具有惟一性和不可伪造性,并且是可以动态变化的。同时还给出了IEEE802.11无线局域网环境中基于混沌理论的动态认证方案和过程。研究结果表明,该方案具有良好的加密效果,运算量小,抗攻击强,有较高的安全性。 Considering the menace of wireless network security, this paper proposed a wireless security authentication scheme based on Chaos algorithm, which can generate Chaos array based on Chaos. Dependence on the initial condition. According to this, wireless security authentication scheme can act as a wireless user, which make it unique, unforgeable, and dynamically change. In addition, the paper provided dynamic authentication scheme and process based on Chaos theory in IEEE 802.11 wireless LAN environment. The research results showed that the scheme has good encryption ability, little operation, strong anti-attack ability, and the high security.
出处 《微电子学与计算机》 CSCD 北大核心 2007年第12期115-117,共3页 Microelectronics & Computer
基金 上海市博士后科研计划项目(05R214120)
关键词 无线局域网 安全技术 挑战/应答 混沌算法 认证 wireless local area network security of network chaUenge/response chaos algorithm authentication
  • 相关文献

参考文献5

二级参考文献12

  • 1陈栋,赵荣椿,叶敏,王朋.基于软硬件协同的机群数据通信机制的研究与实现[J].微电子学与计算机,2005,22(1):128-129. 被引量:5
  • 2宫晓渊,周兴社,李志刚,刘刚.无线传感器网络组织结构研究[J].微电子学与计算机,2005,22(12):171-174. 被引量:14
  • 3MichelMONLY Marie-BernadettePAUTET.The GSM system for mobile communications[M].电子工业出版社,1996.259-271.
  • 4Stojanovski T, Kocarev L. Chaos-Based Random Number Generators-Part l: Analysis. IEEE Transactions on Circuits System-l:Fundamental Theory and Application, 2001, 48(3): 281-288.
  • 5Jakimoski, Kpcarev L Chaos and Cryptography. Block Encryption Ciphers Based on Chaotic Maps. IEEE Transactions on Circuits System-l: Fundamental Theory and Application, 2001, 48(2): 163-169.
  • 6喻宗泉.蓝牙技术基础.机械工业出版社,2005,12:6~7
  • 7李朝青.无线发送/接收IC芯片及其数据通信技术.北京:航空航天大学出版社,2002,10:67~69
  • 8Antolin Agatep.UART to PCMCIA Bridging for Bluetooth
  • 9Bluetooth SIG groups.Profiles Definition of the Bluetooth System
  • 10王相生,甘骏人.一种基于混沌的序列密码生成方法[J].计算机学报,2002,25(4):351-356. 被引量:45

共引文献20

同被引文献15

  • 1范林秀,陈舒娅,王喜进.基于PKI的身份认证在电子商务中的研究[J].电脑知识与技术(过刊),2007(22):979-980. 被引量:7
  • 2尹汉东,任邵东,周生炳.基于Web服务的P2P服务器端实现[J].计算机仿真,2004,21(10):115-118. 被引量:6
  • 3张瀚,王秀峰,李朝晖,刘大海.基于时空混沌系统的单向Hash函数构造[J].物理学报,2005,54(9):4006-4011. 被引量:33
  • 4陈帅,钟先信,刘积学,石军锋,廖晓纬.双字节离散数字混沌序列发生器芯片核[J].压电与声光,2007,29(1):100-102. 被引量:1
  • 5EPC radio - frequency identity protocols class - 1 generation- 2 UHF RFID protocol for communications at 860 MHz- 960 MHz version 1.0.9[S]. EPC global Inc, 2005.
  • 6Ripeanu M,foster I,Iamnitchi A.Mapping the gnutellanetwork:properties of lamescale peer-to-peer systemsand implications for system design[J].IEEE InternetComputinn,2002(6):50-57.
  • 7Brendan Kitts, David Freed, Martin Vrieze. Cross- sell : A Fast Promotion Tunable Customer-ItemReeom- mendation Method Based on Conditionally Independ- ent Probabilities[C]// Proceedings of KDD, [S. L. ]. Based on ACM Press. 2000:437-446.
  • 8Mladenic D. Personal web watcher: design and imple- mentation [M]. Department for Intelligent System, J. Stefan Institute. 2000.
  • 9Susan Gauch, Jeason Chaffee. Ontology-based person- alized search and browsing[J]. Web Intelligence and Agent Systems2003,1(3):219-234.
  • 10Konstan JA, Miller B N Maltz, Herlocker D, et al. Grouplens: applyingcollaborative filtering to usenet news[J]. Communications of the ACM, 1997: 165- 169.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部