期刊文献+

基于WAPI的WLAN与3G网络安全融合 被引量:18

Security Integration of WAPI Based WLAN and 3G
下载PDF
导出
摘要 以3G和WLAN为代表的异构无线网络融合是下一代无线网络发展的必然趋势.安全融合是网络融合面临的主要挑战之一,如何融合不同接入网络的异构安全体系结构、统一用户管理是亟待解决的问题.针对3G与基于WAPI的WLAN之间的安全融合问题,提出了新的基于USIM的证书分发协议,给出了松耦合和紧耦合两种安全融合方案,统一了3G安全体系与WAPI的用户管理,实现了3G签约用户基于WAPI安全机制的网络接入以及身份隐私保护.利用CK模型分析了证书分发协议的身份认证和匿名性,结果表明该协议是可证明安全的. Heterogeneous wireless network integration, typically 3G and WLAN integration, is an inevitable trend. Security is one of the major challenges which heterogeneous wireless network integration faces. How to integrate the vastly different security architectures used in each access network and unify user management is to he solved in urgent need. To achieve the security integration of 3G and WAPI based WLAN, a USIM based certificate distribution protocol is proposed. Two security integration schemes, i. e. , loosely coupled and tightly coupled, are presented, which unify user management of 3G security architecture and WAPI, and realize WAPI based network access for 3G subscribers and identity privacy protection. The entity authentica- tion and anonymity of the certificate distribution protocol is analyzed in CK model, and the results show that the protocol is provably secure.
出处 《计算机学报》 EI CSCD 北大核心 2010年第9期1675-1685,共11页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2007AA01Z429) 国家自然科学基金(60633020 60702059 60872041)资助~~
关键词 异构网络 安全融合 WAPI 匿名性 紧耦合 松耦合 heterogeneous networks security integration WAPI anonymity tightly coupled loosely coupled
  • 相关文献

参考文献26

  • 1Gustafsson E,Johnson A.Always best connected.IEEE Wireless Communications,2003,10(1):49-55.
  • 23GPP TS 23.234.3GPP system to Wireless Local Area Network (WLAN) interworking;System description.2008.
  • 33GPP TS 23.402.Architecture enhancements for non-3GPP accesses.2010.
  • 4Shin M,Ma J,Mishra A,Arbaugh W.Wireless network security and interworking.Proceedings of the IEEE,2006,94(2):455-466.
  • 53GPP TS 33.102.3G security;Security architecture.2009.
  • 6IEEE 802.11i.IEEE standard for Information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements-part 11:Wireless LAN medium access control and physical layer specifications amendment 6:Medium access control security enhancements.2004.
  • 7中华人民共和国国家标准.GB 15629.11-2003/XG1-2006 (信息技术-系统间远程通信和信息交换-局域网和城域网-特定要求第11部分:无线局域网媒体访问控制和物理层规范).2006.
  • 83GPP TS 33.234.3G Security;Wireless Local Area Network (WLAN) interworking security.2008.
  • 9Arkko J,Haverinen H.Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA).The Internet Society RFC 4187,2006.
  • 10Tseng Y-M,Yang C-C,Su J-H.Authentication and billing protocols for the integration of WLAN and 3G networks.Wireless Personal Communications,2004,29(3):351-366.

二级参考文献30

  • 1彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3Simon D, Aboba B, and Hurst R. The EAP-TLS authentication protocol. RFC 5216, IETF, 2008.
  • 4Manulis M, Leroy D, and Koeune F. Authenticated wireless roaming via tunnels: making mobile guests feel at home. http://eprint.iacr.org/2008/382. pdf, 2008.
  • 5Vivek K and Vivek S A. Elliptic curve cryptography[C]. www.acm.org/ubiquity/volume_ 9/pf/v9i20_singh.pdf. ACM Ubiquity, 2008.
  • 6Canetti R and Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels (Full Version), http://eprint.iacr.org. 2001.
  • 7Bellare M, Canetti R, and Krawczyk H. A modular approach to the design and analysis of authentication and key exchange protocols[C]. Proceedings of the 30th ACM Symposium on Theory of Computing, Dallas, 1998: 419-428.
  • 8Tin Y S T, Vasanta H, Boyd C, and Nieto J M G. Protocols with security proofs for mobile applications[C]. Proceedings of the ACISP 2004, Sydney, July. 13-15, 2004: 358-369.
  • 9Tin Y S T, Boyd C, and Nieto J G. Provably secure key exchange: an engineering approach[C]. Proceedings of the Australasian Information Security Workshop (AISW2003), Australasian, 2003: 97-104.
  • 10Zhu J. , Ma J.. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 2004

共引文献74

同被引文献158

引证文献18

二级引证文献208

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部