期刊文献+

远程接入短信动态口令系统的阻塞攻击分析及其对策 被引量:1

Denial-of-Service Attack Analysis of Dynamic Password and Proposed Countermeasures
原文传递
导出
摘要 动态口令是目前常用于替代静态口令的一种强身份鉴别技术,基于短信的动态口令又是动态口令系统中的一种低成本、易管理的实现模式。远程接入系统认证时常使用短信动态口令来加强对账号安全的保障,目前广泛使用的远程接入短信动态口令系统中,由于动态口令的触发产生机制简单无保护,易于形成阻塞攻击,论文详细分析了短信动态口令的触发机制,并提出一种改进方法,用于降低阻塞攻击对远程访问系统带来的风险。 Dynamic Password is an authentication technology substitutive for the usual static password authentication Mobilepass is one of dynamic password with low cost and easy management Mobilepass is widely used in remote access system to improve the account security. Because of the simple mechanism for creating dynamic password in remote access system, denial-of-ervice attack is often found. This paper describes in detail the mechanism for creating mobilpass and finally proposes the corresponding security reinforcements to reduce the risk of denial of service attack.
出处 《信息安全与通信保密》 2008年第12期103-106,共4页 Information Security and Communications Privacy
关键词 动态口令 身份认证 短信口令 远程接入 阻寒攻击 dynamic password authentication mobilepass remote access denial-of-service attack
  • 相关文献

参考文献9

  • 1[1]Robert Morris,Ken Thompson.Password security.A case history[J].CACAM,22(11):594-597,November 1979.
  • 2[2]L Lamport.Password authentication with insecure communication[J].Communications of the ACM,vol.24,770-772,November 1981.
  • 3谢亮,汪海航,谭成翔.安全短消息应用系统方案研究[J].计算机安全,2007(8):30-32. 被引量:5
  • 4[4]William Enck,Patrick Traynor,Patrick McDaniel,et al.Exploiting Open Functionality in SMSCapable Cellular Networks[].C CS'05,November 7-11,2005,Alexandria,Virginia,USA.
  • 5叶建成.DDoS攻击及其防御技术研究[J].现代计算机,2008,14(1):67-69. 被引量:10
  • 6江红,熊思民.短消息业务SMS[J].重庆邮电学院学报(自然科学版),2001,13(2):43-46. 被引量:15
  • 7毛光灿,景旭.基于短信的动态口令系统方案[J].计算机工程与设计,2007,28(17):4122-4123. 被引量:2
  • 8[8]Neil Haller.The S/KEY One-Time Password System[C].Proceedings of the ISOC Symposium on Network and Distributed System Security,February 1994,San Diego,CA.
  • 9[9]Haller N.The S/KEY One-Time Password System[R].RFC 1760,Bellcore,February 1995.

二级参考文献21

  • 1张文.动态口令身份认证系统的设计与实现[J].微计算机信息,2005,21(3):232-233. 被引量:26
  • 2魏永禄,朱红,邱兵.基于双因素特征的信息安全身份认证技术研究[J].山东大学学报(理学版),2005,40(3):76-79. 被引量:11
  • 3施国君,李强.基于双因子认证技术的网络身份识别[J].信息安全与通信保密,2005,27(11):93-95. 被引量:9
  • 4徐鹏,金伟信,石勇.基于短消息实现无线密钥分发的研究[J].信息安全与通信保密,2006,28(8):116-118. 被引量:3
  • 5[1]GSM 0339(Version 6.0.0):European digital cellular telecommunications syste m(Phase 2+);Interface protocols for the connection of Short Message Service Cent res(SMSCs)to Short Message Entities(SMEs)[S].
  • 6[2]GSM 0340(Version 6.0.0):European digital cellular telecommunications syste m(Phase 2);Technical realization of the Short Message Service Point to Point[S ].
  • 7[3]Short Message Pere to Pere Protocol Specification v3.4(document version:- 12-oct-1999 issue 1.2)[S].
  • 8汤放鸣,李洪敏.口令验证系统评价准则分析[C].第18次全国计算机安全学术交流会论文集.北京:中国计算机协会计算机安全专业委员会,2003:85-89.
  • 9RSA公司.使用SecurID保护企业数据资产-身份认证系统安全解决方案[R].http://www.winscom.com/dzqk/c7.html,2006.
  • 10William Stallings.密码编码学与网络安全:原理与实践[M].3版.北京:电子工业出版社,2004:300-321.

共引文献28

同被引文献8

  • 1李波,杨茂云,何大可.一种智能卡口令认证方案的分析与改进[J].通信技术,2003,36(8):104-105. 被引量:3
  • 2ISO/IEC 11770 -4 -2006, Information Technology-Securi- ty Techniques - Key Management - Part4: Mechanisms based on Weak Secrets [ S ]. [ s. 1. ]: Joint Technical Committee ISO/IEC JTC 1,2006.
  • 3Hwang M S, Li L H. A New Remote User Authentication Scheme Using Smart Cards [ J ]. IEEE Transactions on Consumer Electronics, 2000, 46 (01) : 28-30.
  • 4SUN H M. An Efficient Remote User Authentication Scheme Using Amart Cards [ J ]. IEEE Transactions on Consumer Electronics, 2000, 46 (04) : 958-961.
  • 5KU W C , CHEN S M. Weaknesses and Improvement of an Efficient Password based Remote User Authentication Scheme Using Smart Cards [ J ], IEEE Transactions on Consumer Electronics, 2004, 50(01 ) :204-207.
  • 6WANG Xiao-min, ZHANG Wen-fang. Cryptanalysis and Improvement on two Efficient Remote User Authentication Scheme Using Smart Cards[ J ]. Computer Standards & in- terfaces, 2007 ( 29 ) : 507-512.
  • 7Ratha N, Connell J, Bolle R., Enhancing Security and Privacy in Biometries-based Authentication Systems[ J]. IBM Systems Journal, 2010(40) : 614-634.
  • 8Simoens K, Bringer J, Chabanne H, Seys S. A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems[J]. IEEE Transactions on Informa- tion Forensics and Security,2012,7(02) :833-841.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部