期刊文献+

个人通信系统中的移动用户登记认证协议 被引量:2

Authentication protocol for mobile user registration in personal communication systems
下载PDF
导出
摘要 基于个人通信系统的公钥P&A模型,设计了用户位置登记认证协议,并采用BAN认证逻辑对协议的安全性进行了形式化证明,对协议的计算复杂性进行了定性分析.分析表明,所提出的协议与现有的协议相比具有许多新的安全特性. Impersonation and eavesdropping are the crucial threats in wireless communication systems. In personal communication systems (PCS), it is necessary to provide security protection for the voice/data transmitted over wireless links, and perform mutual authentication between mobile user and serving network. Recently, many protocols are proposed for different mobile networks, such as GSM, IS 41, CDPD and wireless LAN. However, these protocols have different weaknesses when they are applied in the PCS environment. Based on the public key P&A model proposed in , this paper presents an authentication protocol for mobile user registration. Then the formalized security proof of the protocol using the BAN authentication logic, and the qualitative analysis about its computing complexity are given. Results show that many new security features are added to the proposed protocols when it is compared with the protocols available.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 1997年第3期323-328,共6页 Journal of Xidian University
基金 国家自然科学基金 军事电子预研基金
关键词 移动通信 通信系统 认证协议 BAN逻辑 安全性 personal communication system authentication protocol BAN logic
  • 相关文献

参考文献2

  • 1Liu J,Proceedings of PIMRC’95,1995年
  • 2Lin H Y,ACM Comput Commun Rev,1995年,9期,256页

同被引文献14

  • 1LAN MAN Standards of IEEE Comp.Soc.Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specification[S].ANSI/IEEE Std 802.11,1999 Editon.
  • 2Arbaugh W A,Shankar N,Wan Y C J,et al.Your 802.11 wireless network has no clothes[J].IEEE Wireless Communications,2002,9(6):44-51.
  • 3Borisov N,Goldberg L,Wagner D.Intercepting mobile communications:The insecurity of 802.11[A].In:Proceedings of the 7th annual international conference on Mobile computing and networking[C].NY,USA:ACM Press,2001:180-189.
  • 4中华人民共和国国家质量监督检验检疫总局.无线局域网媒体访问(MAC)和物理(PHY)层规范[S].中国:中华人民共和国国家标准GB 15629.11-2003.
  • 5Burrows M,Abadi M,Needham R.A logic of authentication[J].ACM Transaction on Computer Systems,1990,8(1):18-36.
  • 6Aziz A,Diffie W.Privacy and authentication for Wireless Local Area Networks[J].IEEE Personal Communications,[see also IEEE Wireless Communications],1994,1(1):25-31.
  • 7Arbaugh W A, Shankar N, Wan Y C J, et al. Your 802.11 Wireless Network Has No Clothes[J]. IEEE Wireless Communications, 2002,9(6): 44-51
  • 8Nikita B. Lan G, David W. Intercepting Mobile Communications: the Insecttrity of 802,11[C]. Proceedings of the 7^th Annual International Conference on Mobile Computing and Networking. Rome, Italy.2001.
  • 9中华人民共和国国家质量监督检验检疫总局.GB15629无线局域网媒体访问(MAC)和物理(PHY)层规范[S].2003-05-12
  • 10中华人民共和国国家质量监督检验检疫总局,GB15629 H02-2003.无线局域网媒体访问控制和物理层规范.2.4GHz频段较高速物理层扩展规范[S].2003-05-12

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部