期刊文献+

基于否定选择的身份认证技术

Identity authentication based on negative selection algorithm
下载PDF
导出
摘要 为了提高用户身份认证的有效性,给出了一个集成肯定认证机制和否定认证机制的双层认证模型。首先,基于人体免疫系统T细胞识别自体和非自体的原理,设计了基于否定选择的身份认证机制;接着研究了否定认证机制的关键技术;最后给出双层认证模型的实现细节及性能分析。仿真实验表明,该身份认证模型能够承受各种口令攻击,有效过滤非法用户的登录请求,具有较好的鲁棒性和可用性。 To improve the validity of user identity authentication mechanism, a two-double authentication model integrating positive authentication mechanism and negative authentication mechanism was given. Firstly, inspired from the principle of immune cell identifying self and non-self, an identity authentication mechanism based on negative selection was designed; Secondly, key technologies of negative authentication mechanism were researched, and implementation details of model were given in the end. Simulation tests show that the identity authentication model can stand with password attacks, filtrate out invalid login requests availably, and have advantages of good robustness and reliability.
作者 唐俊
出处 《计算机应用》 CSCD 北大核心 2009年第12期3191-3193,共3页 journal of Computer Applications
基金 湖南省教育厅自然科学研究项目(08D030 07D018)
关键词 身份认证 免疫系统 否定选择算法 自体 非自体 identity authentication immune system negative selection algorithm self non-self
  • 相关文献

参考文献10

  • 1田野,张玉军,刘莹,李忠诚.移动IPv6网络基于身份签名的快速认证方法[J].软件学报,2006,17(9):1980-1988. 被引量:12
  • 2田野,张玉军,张瀚文,李忠诚.移动IPv6网络基于身份的层次化接入认证机制[J].计算机学报,2007,30(6):905-915. 被引量:16
  • 3SMITH R E. Authentication: From passwords to public keys [ M]. New York: Addison-Wesley, 2002.
  • 4THORPE J, van ORSCHOT P C. Towards secure design choices for implementing graphical passwords [ C] // ACSAC: 20th Annual Computer Security Applications Conference. Tucson: ACM Press, 2004:138 - 145.
  • 5BIRGET J C, HONG DA-WEI, MEMON N. Graphical passwords based on robust discrimination [J]. IEEE Transactions on Information Forensics and Security, 2006, 1 (3) : 395 - 399.
  • 6朱锡华.生命的卫士:免疫系统[M].北京:科学技术文献出版社,2004:198-213.
  • 7DASGUPTA D, FORREST S. Artificial immune systems and their applications [ M]. Berlin: Springer-Verlag, 1999:312 -344.
  • 8卢开澄.计算机密码学[M].北京:清华大学出版社,1998..
  • 9ZHOU JI, DASGUPTA D. Real-valued negative selection using variable-sized detectors [C]// GECCO: Genetic and Evolutionary Computation Conference. Washington: ACM Press, 2004: 120- 132.
  • 10MATZINGER P. The danger model: A renewed sense of self [J]. Science, 2002, 296(5566):301-305.

二级参考文献39

  • 1田野,张玉军,刘莹,李忠诚.移动IPv6网络基于身份签名的快速认证方法[J].软件学报,2006,17(9):1980-1988. 被引量:12
  • 2Johnson D, Perkins C, Arkko J. Mobility support in IPv6. IETF RFC 3775, 2004.
  • 3Koodli R. Fast handovers for mobile IPv6. IETF RFC 4068, 2005.
  • 4Le F, Patil B, Perkins CE, Faccin S. Diameter mobile IPv6 application. Internet IETF Draft, draft-le-aaa-diameter-mobileipv6-04,2004.
  • 5Pack S, Choi Y. Pre-Authenticated fast handoff in a public wireless LAN based on IEEE 802.1x model. In: Proc. of the IFIP TC6/WG6.8 Working Conf. on Personal Wireless Communications 2002.
  • 6Kim C, Kim YS, Huh EN, Mun Y. Performance improvement in mobile IPv6 using AAA and fast handoff. In: Proc. of the ICCSA 2004. LNCS 3043, Springer-Verlag, 2004. 738-745.
  • 7Eronen P, Hiller T, Zorn G. Diameter extensible authentication protocol (EAP) application. IETF RFC 4072, 2005.
  • 8Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H. Extensible authentication protocol (EAP). RFC 3748, 2004.
  • 9Aboba B, Simon D. PPP EAP TLS authentication protocol. RFC 2716, 1999.
  • 10Palekar A, Simon D, Salowey J, Zhou H, Zorn G, Josefsson S. Protected EAP protocol (PEAP) version 2. Internet IETF Draft draft-josefsson-pppext-eap-tls-eap- 10, 2004.

共引文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部