期刊文献+

一种基于移动公网的安全专网认证与密钥协商方案 被引量:1

An Authentication and Key Agreement Scheme for Private Network Based on Public Mobile Network
下载PDF
导出
摘要 针对移动公网保障端到端安全的不足,提出了一种基于改进的Diffie-Hellman密钥交换协议机制的安全专网认证和密钥协商设计方案。该方案可以在终端接入移动公网的基础上,实现通信双方端到端的相互认证,同时协商出独立于网络的密钥。性能分析表明,该方案结构简单,安全高效,符合移动通信系统的要求。 In view of the shortage of end - to - end security in public mobile network, an authentication and key agreement design scheme for private network is proposed based on improved Diffie - Hellman protocol mechanism. The scheme can realize mutual authentication of end - to - end communication after mobile terminal accesses public mobile network, and generate secret key independent of network. Performance analysis demonstrates this scheme has a simple structure, high security and efficiency, which satisfies the requirements of mobile network.
出处 《电讯技术》 2008年第3期33-36,共4页 Telecommunication Engineering
基金 重庆市科委科技攻关项目(3G双模商务手机产品研制) 教育部重点项目(207097)
关键词 移动通信 专网安全 认证 密钥协商 mobile communication private network security authentication key agreement
  • 相关文献

参考文献7

二级参考文献25

  • 1张方舟,叶润国,冯彦君,宋成.3G接入技术中认证鉴权的安全性研究[J].微电子学与计算机,2004,21(9):33-37. 被引量:12
  • 2刘建伟.数字移动通信网中的用户认证方案[J].空军电讯工程学院学报,1995(1):12-18. 被引量:4
  • 3徐胜波 王新梅.数字移动通信网中认证与密钥分配方案的研究.密码学进展-Chinacrypto'96[M].北京:科学出版社,1996.128-139.
  • 4[1]3GPP TS33.102, 3G Security: Security architecture[S].
  • 5[2]3GPP TS33.120, 3G Security: Security Principles and Objectives[S].
  • 6[3]3GPP TR33.902, 3G Security: Formal Analysis of the 3G Authentication Protocol[S].
  • 7W Stallings. Cryptography and network security principles and practice (2nd ed)[M]. Prentice Hall, Inc, 1999.
  • 8ETSI TS 133.120, 3G Security[S/OL]. http://www.etsi.org.
  • 9ETSI TS 21.133, Security Threats and Requirements[S/OL]. http://www.etsi.org.
  • 10[美]MessaoudBenantar著 张千里译.互联网公钥基础设施概论[M].北京: 人民邮电出版社,2003..

共引文献24

同被引文献9

  • 1尤增录.战术互联网[M].北京:解放军出版社,2010.
  • 2Raya M,Hubaux J P. Securingvehicular ad hoc networks[J]. Journal of Computer Security,2007,15(1):39-68.
  • 3李亚娟. 战术互联网无线电台子网信息安全措施的研究[J]. 信息安全与通信保密,2012(2):70-71.
  • 4Long M,Wu C H J,Irwin J D. Localized authentication forwireless LAN inter-network roaming[J]. IEEE Proceed-ings of Communications,2004,151(5): 496-500.
  • 5Zhang H,He R,Yuan M,et al. A novel fast authenticationmethod for mobile network access[C] / / Proceedings of2003 IEEE International Conference for Young ComputerScientists. Harbin:IEEE,2003:382-387.
  • 6Wang H,Prasad A R. Fast authentication for inter-domainhandover[C] / / Proceedings of 2004 International Confer-ence on Telecommunications. Fortaleza, Brazil: IEEE,2004:973-982.
  • 7Ohba Y,Das S,Dutta A. Kerberized handover keying:amedia-independent handover key management architec-ture[C] / / Proceedings of ACM MobiArch. New York,USA:ACM,2007:251-256.
  • 8Lin X,Sun X,Wang X,et al. TSVC: timed efficient andsecure vehicular communications with privacy preserving[J]. IEEE Transactions on Wireless Communications,2008,7(12):4987-4998.
  • 9王伟,杜静,周子琛.电子军务系统中T-RBAC访问控制组件的设计与应用[J].电讯技术,2012,52(5):790-795. 被引量:1

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部