期刊文献+

一种基于签密的移动自组网络身份认证方案 被引量:2

Identity authentication scheme based on signcryption in mobile Ad Hoc networks
下载PDF
导出
摘要 移动自组网是一种有特殊用途的对等式网络,具有无中心、自组织、可快速展开、可移动等特点,这些特点使得它在战场、救灾等特殊场合的应用日渐受到人们的重视。对移动自组织网络节点间的认证技术进行了研究。分析了目前移动自组网络中适用的认证协议和方法,提出一种基于签密的无线Ad Hoc网络身份认证方案。通过分析证明,该方案在无线AdHoc网络环境中有较高的安全性。 Mobile Ad Hoc network is a special peer-to-peer network that is infrastructure-less,self-organizing and dynamically reconfiguration and mobile.And now people pay more attention to the using of Ad Hoc network in emergence area such as battlefield and disaster rescue.Analyze mobile node authentication method in mobile Ad Hoc networks.The proposed authentication scheme based on signcryption could be used to realize efficient and secure authentication in distributed mobility environment.
作者 刘志远 高超
出处 《计算机工程与应用》 CSCD 北大核心 2008年第17期111-114,共4页 Computer Engineering and Applications
基金 国家自然科学基金( the National Natural Science Foundation of China under Grant No.60403027)
关键词 移动自组网 签密 认证 身份 Ad Hoc networks signcryption authentication identity
  • 相关文献

参考文献10

  • 1Zhou L, Haas Z J.Securing Ad Hoc networks[J].IEEE Network Magazine, 1999, 13(6) :24-30.
  • 2Kong J,Zerfos P,Luo H,et al.Providing robust and ubiquitous security support for mobile ad-hoc networks[C]//International Conference on Network Protocols(ICNP),2001:251-260.
  • 3Chadwick D W,Young A J.Merging and extending the PGP and PEM trust models-the ICE-TEL trust model[J].IEEE Network Magazine, 1997:16-24,
  • 4Capkun S,Buttyan L,Hubaux J P.Self-irganized public-key management for mobile Ad Hoc networks [J].IEEE Transactions on Mobile Computing, 2003,2( 1 ) : 52-64.
  • 5Pedersen T.Non-lnteractive and information-theoretic secure verifiable secret sharing[C]//LNCS 576:Proc of the Crypto 91.Berlin: Springer- Verlag, 1991 : 1291-140.
  • 6李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 7Horn G,Preneel B.Authentication and payment in future mobile systems[C]//Lecture Notes in Computer Science:Proceedings of Computer Security ESORICS'98.Berlin:Springer Verlag,1998,1485:277-293.
  • 8GO J,KIM K.Wireless authentication protocol preserving user anonymity[C]//SCIS 2001,2001:23-26.
  • 9姬东耀,王育民.移动计算网络环境中的认证与小额支付协议[J].电子学报,2002,30(4):495-498. 被引量:12
  • 10陈恺,刘莹,肖国镇.移动通信系统中有效的身份认证方案和支付协议[J].通信学报,2002,23(3):15-20. 被引量:11

二级参考文献29

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3[1]Z J Hass,R Alonso,D Duchamp,B Gopinath.Special issue on mobile and wireless comp uting networks [J].IEEE Journal on Selected Areas in Communications,1995,13(5) :839-923.
  • 4[2]R Molva,D Samfat,G Tsudic.Authentication of mobile users [J].IEEE Network,1994 ,8(2):26-34.
  • 5[3]S Mohan,Privacy and authentication protocols for PCS [J].IEEE personal communi cations magazine,1996,3(5):34-38.
  • 6[4]L Harn,H Lin.Modifications to enhance the security of GSM [A].Proc 5th Nat Con f on Information Security[C].Taiwan,1995.97-100.
  • 7[5]Y Frankel,A Herzberg.Security issues in a CDPD wireless network [J].IEEE Perso nal communications magazine,1995,2(4):16-27.
  • 8[6]ETSI SMG/SG/TD-73.Protocols for UMTS Providing Mutual Authentication and Key Es tablishment Using Asymmetric Techniques[S].
  • 9[7]M Bellare,S K Miner.A forward -secure digital signature scheme[A].Proc.Cryto ′99[C].Berlin:Springer.1999.431-448.
  • 10[8]S M Bellovin,M Merrit,Limitation of the kerberos authentication system [J].Com puter Communication Review,1990,20(5):119-132.

共引文献92

同被引文献13

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部