期刊文献+

一种基于融合网络通用可组合安全的漫游认证协议 被引量:3

Universally Composable Secure Roaming Authentication Protocol for Interworking Networks
下载PDF
导出
摘要 无线网络融合是通信业发展的趋势,其中安全问题是当前研究的关注点。针对以3G网络为核心网络,采用蓝牙、WiMAX和无线局域网为接入网络构成的融合网络中认证协议的安全和效率问题,提出了一种高效的漫游认证协议。该协议通过对无线接入网络身份进行验证,抵御了重定向攻击的行为,实现了漫游认证的密钥分发;采用局部化认证过程,减少了认证消息的传输延时,提高了认证协议的效率,并给出了在NS2环境下的性能仿真结果。通过通用可组合安全模型对新协议进行的安全性分析,证明该协议具有UC安全属性。 Security problems in interworking networks have attracted much attention of researchers recently. The typical interworking networks can be constructed with the core network WCDMA and the accessing networks WiMAX and WLAN. Considering security and efficiency issues, a roaming authentication protocol based on symmetric cryptographic algorithms was proposed for that network. It verified the identity of wireless access networks to prevent the redirection attack, and used the localized authentication mechanism to reduce the message transmission delay and improve the effi ciency of reauthentication process. The efficiency of proposed protocol was simulated in NS2. By analyzing the security of the proposed protocol with universally composable(UC)model, it proves that the proposed protocol satisfies the definition of UC security defined in the UC model.
出处 《计算机科学》 CSCD 北大核心 2010年第1期47-50,78,共5页 Computer Science
基金 国家自然科学基金项目(60633020 60573036)资助
关键词 无线网络 认证协议 会话密钥 漫游 Wireless network,Authentication protocol,Session key,Roaming
  • 相关文献

参考文献14

  • 13GPP. TR 33. 821 Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution(SAE) (Release 8) [S]. Valbonne: 3GPP, 2007.
  • 2Canetti R. Universally Composable Security: A New Paradigm for Cryptographie Protocols[C]//Proceedings of the 42nd IEEE Symposium on the FOCS. New York: IEEE Press, 2001:136-145.
  • 3Chen Y, Hao C K. 3G and WLAN interworking security: current status and key issues[J]. International Journal of Network Security,2006,2(1) :1-13.
  • 4Abadi M. Reconciling two views of cryptography[J]. Journal of Cryptology, 2002,5 (2) : 103-227.
  • 5Mao Wenbo. Modern Cryptography: Theory and Practice[M]. Prentice-Hall, PTR, 2004.
  • 6Bellare M.Random Oracles are Practicah a Paradigm for designing efficient protocots[C]//First ACM Conference on Computer and Communications Security. New York: ACM Press, 1993,62-73.
  • 7Beaver D. Foundations of secure interactive computing [ C ] // Joan Feigenbaum: Advances in Cryptology-Crypto' 91. Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1991 : 377- 391.
  • 8Yao C. Protocols for secure computations (extended abstract) [C]//23rd Annual Symposium on Foundations of Computer Science. 160-164.
  • 9Canetti R. Analysis of key exchange protocols and their use for building secure channels[C]//Euroerypt'01. 2001.
  • 10Canetti R. Security Analysis of IKE's Signature - based Key Exchange Protocol[C]//Advances in Cryptology- Crypto 2002.

同被引文献38

  • 1王立明,杨波.集成AAA的移动IP注册方案[J].西安电子科技大学学报,2004,31(6):952-954. 被引量:6
  • 2周康,同小军,许进.资源优化模型及遗传算法[J].华中科技大学学报(自然科学版),2005,33(10):59-62. 被引量:6
  • 3RAN Canetti.Universal composable security:A new paradigmfor cryptographic protocols[C].Proceedings 42nd IEEE Sym-posium on Foundations of Computer Science,2001:136-145.
  • 4Mrten Trolin.A universally composable scheme for electroniccash[C].Proceedings of INDOCRYPT,2005:347-360.
  • 5Aggelos Kiayias,ZHOU Hongsheng.Trading static for adap-tive security in universally composable zero-knowledge[C].Proceedings of ICALP,2007:316-327.
  • 6Matthew Green,Susan Hohenberger.Universally composableadaptive oblivious transfer[C].International Crytology Con-ference-ASIACRYPT,2008:179-197.
  • 7Mike Burmester,Tri Van Le,Breno De Medeiros,et al.Uni-versally composable RFID identification and authentication pro-tocols[J].ACM Transactions on Information and System Se-curity-TISSEC,2009,12(4):1-33.
  • 8Choudary Gorantla M,Colin Boyd,Juan Manuel González Nieto.Universally composable contributory group key exchange[C].Computer and Communications Security,2009:146-156.
  • 9Goldwasser S,Micali S,Rackoff C.The knowledge complexityof interactive proof systems[J].SIAM Journal on Comput,1989,18(1):186-208.
  • 10Danny Dolev,Andrew,Yao C.On the security of public keyprotocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部