期刊文献+

一种高效的无线传输层安全握手协议 被引量:1

Efficient Wireless Transport Layer Security Handshake Protocol
下载PDF
导出
摘要 现有的无线传输层安全(WTLS)握手协议通信量大,且不能对服务器证书的有效性进行在线验证。针对上述问题,提出一种改进的WTLS协议。在无线通信客户端预存服务器证书,握手过程中以证书的唯一标识检索证书,以降低握手协议的通信载荷。引入可信证书验证代理负责服务器证书的在线验证,并生成证书状态凭据。客户端通过验证该凭据的真实性,实现对服务器证书有效性的在线验证,从而提高协议的安全性。 The existing Wireless Transport Layer Security(WTLS) handshake protocol requires to exchange certificates between the client and the server,thus causes considerable communication load.And it allows client to avoid verifying the revocation state of the server certificate,which is a security flaw.In order to solve these problems,this paper proposes an improved WTLS handshake protocol based on Trusted Certificate Verification Proxy(TCVP).It only exchanges certificate identifier between the client and the server,which reduces the message payload.Moreover,TCVP is introduced to verify the online status of server certificate and seals it in a security ticket.By checking the ticket,the client is able to determine if the server certificate is valid without verifying it by itself.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第16期123-125,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2009AA01Z437)
关键词 无线传输层安全握手协议 可信证书验证代理 身份认证 无线网络 在线验证 Wireless Transport Layer Security(WTLS) handshake protocol Trusted Certificate Verification Proxy(TCVP) identity authentication wireless network online verification
  • 相关文献

参考文献4

二级参考文献25

  • 1[1]TRASK N T, JAEEED S A. Adapting public key infrastructures to the mobile environment [J]. BT Technol J, 2001,19 (3): 76 ~ 79.http ://www. soi. city. ac. uk/~ kam/trask. pdf
  • 2[2]Certicom Corporation 2000. Complete WAP Security [Z]. http ://www. certicom. com/resources/download/WAP. pdf
  • 3[3]Certicom Corporation 2001. Wireless Public-Key Infrastructure [Z].http ://www. certicom. com/resources/download/WAP. pdf
  • 4[4]Sami Jormalainen, Jouni Laine. Security in the WTLS [D]. Computer Science and Engineering Helsinki University of Technology.10.1. 2000. http ://www. hut. fi/ ~ jtlaine2/wtls/
  • 5K Lee, S Moon, W Jeong, T Kim. A-2-pass authentication and key agreement protocol for mobile communications. In: Proceedings of the 2nd International Conference on Information Security and Cryptology, ICISC'99. 1999. 143-155
  • 6C Gunther. An identity-based key-exchange protocol. In:Advances in Cryptology-Eurocrypto'89. Springer-Verlag, 1990.29-37
  • 7W A P Forum. Wireless application protocol wireless transport layer security specification. Version 06-Apr-2001
  • 8W Diffie, P van Oorschot, M Wiener. Authentication and authenticated key exchanges. Designs Codes and Cryptography. 1992.2:107-125
  • 9M Bellare, S K Miner. A forward-secure digital signature scheme. In: Advances in Cryptology-Crypto'99. Springer-Verlag, 1999
  • 10DongGook Park, Colin Boyd, Sang-Jae Moon. Forward secrecy and its application to future mobile communications security. PKC2000,LNCS 1751. Spring-Verlag, 2000. 433-445

共引文献16

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部