期刊文献+

一种新的Mesh网络漫游接入协议 被引量:1

New authentication protocol of roaming for wireless mesh network
下载PDF
导出
摘要 针对无线Mesh网络现有接入认证协议不能满足节点漫游对性能和身份保护需求的问题,基于'通用可组合'安全模型的组合特性与匿名技术,采用将身份与归属域分开处理的方式,设计了一种满足漫游特殊要求———身份保护和认证时延的接入认证协议,该协议不仅具有可证明的安全性和必需的安全性质,而且通信效率优于原有协议。 The authentication protocol of wireless mesh networks does not conform to the requirements of performance and ID security in roaming scenario. A new authentication protocol is proposed based on the combination characteristic of UC-security model and anonymity technique. By separating the user's ID from home network,this protocol not only ensures the confidentiality of user's identity and reduces the costs of protocol but also provides provable UC-security and necessary security attributes. It possesses the advantage of communication and computation costs over other existing protocols.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2008年第2期423-428,共6页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(60633020 60573036)
关键词 计算机系统结构 MESH网络 漫游 身份保护 可证明安全 computer system organization Mesh networks roaming identity protection provable security
  • 相关文献

参考文献9

  • 1IEEE P802. 11s/D1. 0 simple efficient extensible mesh (SEE-Mesh) proposal [EB/OL]. [ 2006-11- 12]. http://www. ieee802. org/11/December.
  • 2IEEE P802.11i/D3.0. specification for enhanced se curity[DB/OL]. [2006-11-30]. http: //www. cs. umd. edu/-mhshin/doc/ 802. 11i/ 802. 11iD3. 0. pdf.
  • 3Aboba B, Blunk L, Vollbreeht J. Extensible authentication protocol (EAP)[Z]. RFC 3748,2004.
  • 4Canetti R. Universally composable security: a new paradigm for cryptographic protocols[C]//Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS). New York: IEEE Press, 2001.
  • 5Song B, Kim K. Two-pass authenticated key agreement protocol with key confirmation[C]//Proceedings of Cryptology-IN-DOCRYPT 2000, Lecture Notes in Computer Science 1977. Berlin: Springer Verlag, 2000.
  • 6Blumental Uri, Buddhikot Milind M, Garay Juan A, et al. A scheme for authentication and dynamic key exchange in wireless networks[J]. Bell Labs Technicla Journal, 2002,7 (2) : 37-48.
  • 7Bellare M, Rogaway P. Entity authentication and key exchange[C]//The Proc of the Advances in Cryptology- Crypto'9 3. Berlin: Springer-Verlag, 1993.
  • 8Bellare M, Canetti R, Krawczyk H. A modular approach to the design and analysis of authentication and key-exchange protocols[C] // Proc of the 30th Annual Symp on the Theory of Computing. New York: ACM Press, 1998.
  • 9Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attacks[J]. SIAM Journal on Computing, 1998, 17 (2) :281-308.

同被引文献8

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 2Chi Kuang-hui, Shih Yung-chien, Liu Ho-han, et al. Fast handoff in secure IEEE 802.11s mesh networks. IEEE Transactions on Vehicular Technology, 2011, 60(1): 219-232.
  • 3Li Nan. Research on Diffie-Hellman key exchange protocol. Proceedings of the 2nd International Conference on Computer Engineering and Technology, Chengdu, China, 2010:634-637.
  • 4Bellare M, Canetti R, Klawczyk H. A modular approach to the design and analysis of authentication and key-exchange protocols. Proceedings of the 30th Annual Symposium on the Theory of Computing, New York, USA, 1998:419-428.
  • 5Boneh D. The decision Diffie-Hellman problem. Lecture Notes in Computer Science, 1998(1423):48-63.
  • 6Zhang Fan, Ma Jianfeng, Moon S J, et al. The security proof of a 4-way handshake protocol in IEEE 802.11i. Lecture Notes in Computer Science, 2005(3802): 488-493.
  • 7朱辉,李晖,杨加喜,王育民.一种可证明安全的通用多信任域认证协议[J].武汉大学学报(信息科学版),2008,33(10):1051-1054. 被引量:4
  • 8彭清泉,裴庆祺,庞辽军,马建峰.一种WLAN Mesh网络快速切换认证方法[J].江苏大学学报(自然科学版),2010,31(4):458-463. 被引量:3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部