期刊文献+

一种WLAN Mesh网络快速切换认证方法 被引量:3

An authentication method for fast handoff in WLAN mesh networks
下载PDF
导出
摘要 针对WLAN Mesh网络中Mesh接入点(MAP)移动时快速切换认证过程中存在的安全问题,采用基于邻居图的快速切换方法和基于矩阵的密钥预分配方法,提出一种快速切换认证方案,该方案能够适应具有移动MAP的WLAN Mesh网络场景.利用Canetti-Krawczyk模型对提出的认证方案进行安全性分析,并对方案中所需的计算和存储代价进行估计.结果表明,在伪随机函数和消息认证码函数是安全的前提下,方案中的认证协议在UM中是SK-安全的,且该方案具有较小的计算和存储代价. The security problem of fast handoffs in WLAN mesh networks with mobile mesh access point (MAP) was analyzed. Based on the neighbor graph fast handover method and matrix-based key pre-distribution scheme, an authentication scheme for fast handoff was proposed. The scheme is suitable to the WLAN mesh networks with mobile MAP. Based on Canetti - Krawczyk model, the improved d - way handshake protocol in the scheme was analyzed. And computation overhead and memory cost were evaluated. The results show that it is SK - secure in UM if the pseudorandom function and MAC function in use are secure against chosen message attacks. The performance shows that the proposed scheme has less computation overhead and memory cost.
出处 《江苏大学学报(自然科学版)》 EI CAS 北大核心 2010年第4期458-463,共6页 Journal of Jiangsu University:Natural Science Edition
基金 国家自然科学基金资助项目(60803151)
关键词 WLAN MESH网络 网络安全 快速切换认证 邻居图 密钥预分配 WLAN Mesh networks network security fast handoff authentication neighbor graph key pre-distribution
  • 相关文献

参考文献10

  • 1Mishra A,Shin M H,Petroni N L,et al.Proactive key distribution using neighbor graphs[J].IEEE Wireless Communications,2004,11 (1):26-36.
  • 2Pack S,Jung H,Kwon T,et al.SNC:a selective neighbor caching scheme for fast handoff in IEEE 802.11 wireless networks[J].ACM Mobile Computing and Communications Review,2005,9 (4):39-49.
  • 3IEEE Standard 802.11r.Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications,Amendment 2:Fast Basic Service Set(BSS) Transition[S].Piscataway:IEEE Computer Society,2005.
  • 4Hur J,Park C,Yoon H.An efficient pre-authentication scheme for IEEE 802.11-based vehicular networks[C] ∥Proceedings of Advances in Information and Computer Security-Second International Workshop on Security 2007.Germany:Springer Verlag,2007:121-136.
  • 5Komarova M,Riguidel M,Hecker A.Fast re-authentication protocol for inter-domain roaming[C] ∥Procee-dings of the 18th Annual IEEE International Symposium on Personal,Indoor and Mobile Radio Communications.Piscataway:IEEE,2007:1-5.
  • 6Li C S,Tseng Y C,Chao H C,et al.A neighbor ca-ching mechanism for handoff in IEEE 802.11 wireless networks[J].Journal of Supercomputing,2008,45 (1):1-14.
  • 7Kassab M,Bonnin J M,Belghith A.Fast and Secure handover in WLANs:an evaluation of the signaling overhead[C] ∥Proceedings of 5th IEEE Consumer Communications and Networking Conference.Piscataway:IEEE Computer Society,2008:770-775.
  • 8Du W L,Deng J,Han Y,et al.A pairwise key pre-distribution scheme for wireless sensor networks[C] ∥Proceedings of 10th ACM Conference on Computer and Communications Security.New York:Association for Computing Machinery,2003:42-51.
  • 9Canetti R,Krawczyk H.Analysis of key-exchange protocol and their use for building secure channels[C] ∥Proceedings of Eurocrypt′01,LNCS 2045.New York:Springer Verlag,2001:453-474.
  • 10Zhang F,Ma J F,Moon S.The security proof of a 4-way handshake protocol in IEEE 802.11i[C] ∥Proceedings of International Conference on Computational Intelligence and Security,LNCS 3802.New York:Sprin-ger Verlag,2005:488-493.

同被引文献26

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 2Chi Kuang-hui, Shih Yung-chien, Liu Ho-han, et al. Fast handoff in secure IEEE 802.11s mesh networks. IEEE Transactions on Vehicular Technology, 2011, 60(1): 219-232.
  • 3Li Nan. Research on Diffie-Hellman key exchange protocol. Proceedings of the 2nd International Conference on Computer Engineering and Technology, Chengdu, China, 2010:634-637.
  • 4Bellare M, Canetti R, Klawczyk H. A modular approach to the design and analysis of authentication and key-exchange protocols. Proceedings of the 30th Annual Symposium on the Theory of Computing, New York, USA, 1998:419-428.
  • 5Boneh D. The decision Diffie-Hellman problem. Lecture Notes in Computer Science, 1998(1423):48-63.
  • 6Zhang Fan, Ma Jianfeng, Moon S J, et al. The security proof of a 4-way handshake protocol in IEEE 802.11i. Lecture Notes in Computer Science, 2005(3802): 488-493.
  • 7MISHRA A, MIN H S, PETRONI N L, et al. Proactive Key Distribution Using Neighbor Graphs[J]. Wireless Communications IEEE, 2004, 11(1) : 26-36.
  • 8HAMDAN T T M, SIGIUK H I, OMAR Y M. Reduction of Handoff Search Phase Time in IEEE 802.11 WLAN to Fulfill Real Time Services Requirements[C]//2009 International Conference on Telecommunications. Washington: IEEE, 2009: 346-351.
  • 9Daojing He,Maode Ma,Yan Zhang,Chun Chen,Jiajun Bu.??A strong user authentication scheme with smart cards for wireless communications(J)Computer Communications . 2010 (3)
  • 10Guangsong Li,Jianfeng Ma,Qi Jiang,Xi Chen.??A novel re-authentication scheme based on tickets in wireless local area networks(J)Journal of Parallel and Distributed Computing . 2011 (7)

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部