期刊文献+

无线环境下的可信网络连接协议 被引量:5

Trusted Network Connect Protocol for Wireless Environment
下载PDF
导出
摘要 为增强无线网络接入认证的安全性,结合可信计算技术和无证书公钥密码体制,提出一种无线环境下的可信网络连接协议.该协议仅需6轮交互就能实现STA与AP之间的双向身份认证和会话密钥协商,同时实现AS对STA的平台可信性验证.安全性和性能分析表明,与IEEE802.11i的接入认证方案相比,新协议的安全性能优势明显. A trusted network connect protocol WTNCP for wireless environment is proposed, in which the trusted computing technology and non-certificate public key cryptography are utilized. The platform authentication and integrity verification are integrated into the user authentication within 6 rounds in such protocol. The security and performance analysis show that the protocol enhances the security of the authentication protocol and has great advantages in both computing and reduction of communication costs.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2010年第5期577-581,共5页 Journal of Beijing University of Technology
基金 国家自然科学基金项目资助(60633020) 国家自然基金项目资助(60573036 60702059) 国家高技术研究发展计划(2007AA01Z429)
关键词 无线网络 可信计算 无证书公钥 可信网络连接 wireless network trusted computing non-certificate public key trusted network connect
  • 相关文献

参考文献9

  • 1IEEE 802. 1 li WORKING GROUP. IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Part H : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 6 : Medium Access Control (MAC) Security Enhancements[ S]. New York: IEEE, 2004.
  • 2HE C H, SUNDARARAJAN M, DATTA A, et al. A modular correctness proof of IEEE802. 11i and TLS[ C ]//Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS'05. New York: ACM, 2005, 2-15.
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 4张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 5林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 6PEARSON S. Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy [ C ] // Eds iTrust'2005, LNCS 3477. Berlin: Springer-Verlag, 2005: 305-320.
  • 7TRUSTED COMPUTING GROUP. TCG trusted network connect tnc architecture for interoperability specification version 1.3 revision 6 [ EB/OL]. [ 2008-04-28 ]. https ://www. trustedcomputinggroup, org.
  • 8BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[ C] ffAdvances in Cryptology- CRYPTO 2001. Berlin: Springer-Verlag, 2001: 213-229.
  • 9SATTAM S, AI-RIYAMI, KENNETH G. Certificateless Public Key Cryptography[ C] //Advances in Cryptology-Asiacrypt 2003. Berlin: Springer-Verlag, 2003 : 452-473.

二级参考文献44

共引文献659

同被引文献41

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部