期刊文献+

一个移动Ad Hoc网密钥协商协议的安全分析 被引量:1

Security analysis of a key agreement protocol for mobile Ad Hoc network
下载PDF
导出
摘要 Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.最近王晓峰等学者提出了一个新的适用于Ad Hoc网的具有口令认证和共享口令进化的多方密钥协商协议,并认为他们的协议是安全而高效的.然而我们发现这一协议存在严重的安全缺陷:不能抵抗离线口令猜测攻击和伪造攻击;不能提供前向安全性和后向安全性;不能动态更新群组成员的密钥. As a new type of wireless mobile networks, Ad Hoc networks do not depend on any fixed infrastructure, and have no centralized control unit and so its computation capabilities are limited by mobile nodes. Recently, Wang, et al. proposed a novel multi-party key agreement protocol with password authentication and sharing password evolvement for Ad Hoc networks and claimed their protocol secure and efficient. However, the research shows the protocol is insecure against off-line password guessing attack and forgery attack. We also point out that the protocol does not meet forward security, backward security and dynamic key evolvement.
作者 徐静
出处 《中国科学院研究生院学报》 CAS CSCD 2008年第5期611-614,共4页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家自然科学基金项目(90604018,60673083,90604010) 中国科学院研究生院院长基金(O55001H)资助
关键词 AD HOC网 密钥协商 安全分析 Ad hoc network, key agreement, security analysis
  • 相关文献

参考文献7

  • 1McDonald AB, Znati T. A mobility-based framework for adaptive clustering in wireless Ad-Hoc networks. IEEE Journal on Selected Areas in Communication, 1999,17(8) : 1466 - 1487
  • 2Zhou LD, Haas ZJ. Securing Ad Hoc networks. IEEE Network, 1999,13(6) :24 - 30
  • 3王海涛 ,刘晓明 .Ad hoc网络的安全问题综述[J].计算机安全,2004(7):26-30. 被引量:6
  • 4Bellare M, Rogway P. Entity authentication and key exchange. In: Stinson DR (ed). Proceedings Crypto'93. California: Springer, Lecture Notes in Computer Science 773. 1993.232 - 249
  • 5Bellare M, Pointcheval D, Rogway P. Authenticated key exchange secure against dictionary attcks. In: Preneel B (ed). Proceedings Eurocrypt'00. Belgium: Springer, Lecture Notes in Computer Science 1807. 2000. 139-155
  • 6KatzJ, Ostrovsky R, Yung M. Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann B (ed). Proceedings Eurocrypt'01. Innsbruck: Springer, Lecture Notes in Computer Science 2045. 2001. 475 -494
  • 7王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案[J].软件学报,2006,17(8):1811-1817. 被引量:18

二级参考文献1

共引文献21

同被引文献13

  • 1王海涛 ,刘晓明 .Ad hoc网络的安全问题综述[J].计算机安全,2004(7):26-30. 被引量:6
  • 2王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案[J].软件学报,2006,17(8):1811-1817. 被引量:18
  • 3McDonald A B,Znati T F.A mobility-based framework for adaptive clustering in wireless ad hoc networks[J].IEEE Journal on Selected Areas in Communications,2006,17(8):1466-1487.
  • 4Zhou L D,Haas Z J.Securing ad hoc networks[J].IEEE Network,1999,13 (6):24-30.
  • 5Asokan N,Ginzboorg P.Key agreement in ad hoc networks[J].Computer Co mmunications,2000,23(17):1627-1637.
  • 6Ertaul L,Chavan N.Security of ad hoc networks and threshold cryptography[C]//Proceedings of the IEEE 2005 International Conference on Wireless Networks,Communications and Mobile Computing.2005,1:69-74.
  • 7Ertaul L,Lu W M.ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (Ⅰ)[C]// Proceedings of the 4th IFIP-TC6 International Conference on Networking Technologies,Services,and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems.2005:102-113.
  • 8Bellare M,Rogaway P.Entity authentication and key distribution[C]//Proceedings of the 13th Annual Intemational Cryptology Conference on Advances in Cryptology.1994:232-249.
  • 9Bellare M,Pointcheval D,Rogaway P.Authenticated key exchange secure against dictionary attacks[C]//Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques.2000:139-155.
  • 10Hu Ronglei,Chi Yaping,Xu Fenglin,et al.A passwordauthenticated key agreement scheme for ad hoc networks[C]// Proceedings of the 5th International Conference on Wireless Communications,Networking and Mobile Computing.2009:2943-2947.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部