期刊文献+

IEEE802.16e标准安全机制的改进 被引量:1

Improved security mechanism for IEEE802.16e standard
下载PDF
导出
摘要 指出了IEEE802.16e安全机制中所存在的严重漏洞。针对无线移动设备存在存储容量有限、处理速度慢、带宽低等问题,利用无线公钥设施中的证书标识符URL和椭圆曲线加密算法对IEEE802.16e中的密钥管理协议(PKM)进行了改进。仿真结果表明改进后的安全机制更适合于无线网络环境。 This paper points out some serious leaks in the security mechanism of IEEESO2.16e.In the face of limited resources of wireless mobile devices such as low processing,bandwidth and storage capabilities,this paper utilizes the certificate URL in the WPKI and ECC eneryption algorithm to improve the Key Management Protocol(PKM) of IEEE802.16e.The simulator result shows that the improved security mechanism is more suitable for the wireless network.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第6期103-106,共4页 Computer Engineering and Applications
基金 粤港关键领域重点突破招标项目20060104-2~~
关键词 IEEE802.16E 安全机制 密钥管理协议 无线公钥设施 IEEE802.16e security mechanism Key Management Protocol(PKM) Wireless Public Key Infrastructure(WPKI)
  • 相关文献

参考文献9

  • 1802.16^TM.IEEE standard for local and metropolitan area networks, part 16,air interface for fixed and mobile broadband wireless access systems[S].[S.l.] : IEEE Press, 2006-02-28.
  • 2802.16^TM.iEEE standard for local and metropolitan area networks, part 16,air interface for fixed broadband wireless access systems[S]. [S.l.]: IEEE Press, 2004-10-01.
  • 3Berners-Lee,Masinter & McCahill.RFC1738 Uniform Resource Locators ( URL)[S/OL]. 1994.http://www.faqs.org/rfcs/rfc 1738.html,.
  • 4Johneton D,Walker J.Overview of IEEES02.16 seeurity[J].IEEE Security & Privacy,2004,2(3):40-48.
  • 5Yang Fan,Zhou Huai-bei,Zhang Lan.An improved security scheme in WMAN based on IEEE standard 802.16[C]//Proceeding 2005 International Conference on Wireless Communications,Networking and Mobile Computing,July 2005,2:1191-1194.
  • 6Wireless application protocol:WAP-217-WPKI-20010424-a[S/OL]. http ://www.openmobitealliance.org/tech/affiliates/wap/wapindex.html.
  • 7RFC 4492-Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)[S/OL].2006.http://www.cnpaf.net/ class/rfcen/061111117397775768.html.
  • 8Liu Fu-qiang,Lu Lei.A WPKI-based security mechanism for IEEE 802.16e[C]//WiCOM 2006,International Conference on Wireless Communications,Networking and Mobile Computing,Sept 21306.
  • 9路纲,佘堃,周明天,刘家芬.WPKI与PKI关键技术对比[J].计算机应用,2005,25(11):2505-2508. 被引量:9

二级参考文献11

  • 1BERNER-LEE T, MASINTER L, MCCAHILL M. RFC1738, Uniform Resource Locators(URL)[S], 1994.
  • 2KENT S, ATKINSON R. RFC2401, Security Architecture for the Internet Protocol[S],1998.
  • 3Wireless Application Protocol: WAP-217-WPKI-20010424-a[S/OL]. http://www.wapforum.com/, 2002.
  • 4THALES e-SECURITY White Paper: Elliptic Curve Cryptography[EB/OL]. http://www.thales-esecurity.com/, 2001.
  • 5SMART NP. The discrete logarithm problem on elliptic curves of trace one[J]. Journal of Cryptology, 1999,12(3): 193-196.
  • 6Wireless Application Protocol:WAP-211-WAPCert-20010522-a[S/OL]. http://www.wapforum.com/, 2002.
  • 7RSA Keon Certificate Authority Eight Million Certificate Test [EB/OL]. http://www.rsasecurity.com/. RSA Security Inc, 2002.
  • 8MYERS M, ANKNEY R, MALPANI A, et al.RFC2560, X.509 Internet Public Infrastructure Online Certificate Status Protocol-OCSP[S],1999.
  • 9Wireless Application Protocol: WAP-261-WTLS-20010406-a[S/OL]. http://www.wapforum.com/, 2002.
  • 10Wireless Application Protocol:WAP-191-WML-20000219-a[S/OL]. http://www.wapforum.com/, 2002.

共引文献8

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部