期刊文献+

一种基于HASH函数的EAP认证协议 被引量:2

A Hash-Based EAP Authentication Protocol
下载PDF
导出
摘要 随着安全认证技术的发展,网络认证已成为保障网络安全的重要环节。当前被广泛使用的IEEE802.1x是建立在可扩展认证协议(EAP)基础上的一种认证框架。EAP提供了许多认证协议,每个认证协议都有自身的优缺点。有些没有提供用户名的保护,有些没有提供双向认证;有些部署较困难等。针对上述缺陷,提出了一种基于哈希函数的认证协议。阐述了该协议的具体认证过程,并对其进行了安全性分析,最后与当前一些认证协议作了比较。 With the development of secure authentication technologies, network authentication has already become an important approach to protect network security. IEEE802.1x, the widely used authentication protocol, is based on the Extensible Authentication Protocol(EAP). EAP provides a lot of specific protocols, most of which have their own advantages and disadvantages. The disvantages include lacking protection of user name and mutual authentication and difficulty in deployment. This paper presents a new hash-based authentication protocol, which aims to avoid the above disadvantages of protocols. Authentication process and security analysis is explained in detail. Comparison with some protocols is also provided.
出处 《计算机系统应用》 2010年第6期74-77,61,共5页 Computer Systems & Applications
基金 广东省部产学研项目(2008B090500201 cgzhzd0807) 广东省科技计划(2008A010100001)
  • 相关文献

参考文献6

  • 1IEEE Standard 802.1X-2001.IEEE standards for local and metropolitan area networks:Port based network access control.2001.
  • 2RFC3580.IEEE 802.1X remote authentication dial in user service(RADIUS)usage guidelines,2003.
  • 3RFIC3748.Extensible Authentication Protocol(EAP).2004.
  • 4Chen T H,Lee W B.A new method for using hash functions to solve remote user authentication.Computers and Electrical Engineering,20071:53-62.
  • 5Sun HM,Yeh H T.Password based authentication and key distribution protocols with perfect forward secrecy.Journal of Computer and System Sciences,2006:1002-1011.
  • 6Yoon E J,Ryu E K,Yoo K Y.A secure user authentication using hash functions.ACM SIGOPS Operating Systems Review,2003:62-68.

同被引文献16

  • 1赵志新,祝跃飞,梁立明.无线局域网隧道认证协议PEAP的分析与改进[J].信息工程大学学报,2005,6(3):52-55. 被引量:3
  • 2吉晓东.支持身份隐藏的EAP-PSK协议改进[J].南通大学学报(自然科学版),2007,6(2):74-77. 被引量:1
  • 3DARIO D C, ANTONIO S, GEORG T. SWIM- a next generation ATM information bus-the SWIM-SUIT prototype[A]. 2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW)[C]. 2010.41- 46.
  • 4BOB S. Security architecture for system wide information manage- merit[A]. The 24th 2005 Digital Avionics Systems Conference (DASC 2005)[C]. 2005.
  • 5BOB S. System-wide information management (SWIM) demonstra- tion security architecture[A]. 2006 IEEE/AIAA 25th Digital Avionics Systems Conference[C]. 2006. 1-12.
  • 6Federal Aviation Administration. System Wide Information Manage- ment (SWIM) eXtensible Markup Language (XML) Gateway Re- quirements[S]. 2009.
  • 7International Civil Aviation Organization. Web service security stan- dards[A]. Aeronautical Telecommunication Network Implementation Coordination Group-Eighth Working Group Meeting[C]. Christchurch New Zealand, 2010.
  • 8IETF RFC3588. Diameter Base Protocol[S]. 2003.
  • 9IETF RFC3748. Extensible Authentication Protocol(EAP)[S]. 2004.
  • 10IETF RFC 4072, Diameter Extensible Authentication Protocol(EAP) AtDlicationr[S]. 2005.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部