期刊文献+

无线网络下可信移动节点接入认证方案 被引量:1

Authentication scheme for trusted mobile nodes in wireless network
下载PDF
导出
摘要 将基于属性且无可信第三方的平台验证协议以及基于身份的加密协议应用到无线网络环境下节点接入认证模型中,提出一个无线网络环境下的可信移动节点接入认证方案。与现有的认证方案相比,基于可信平台的移动节点接入认证方案主要有以下特点:1)在验证移动节点用户身份的同时也验证了移动节点的平台身份;2)不仅提供了移动节点和网络代理间的双向认证,还提供了移动节点间的双向认证。分析表明,改进后的方案满足接入节点身份的匿名性。 The platform authentication protocol based on the property without the third party and the encryption protocol based on identity were applied to the node authentication scheme under the wireless networks.Compared with the existing methods,the proposed trusted mobile node access scheme has two major features: 1) both the mobile platform identity and the mobile user identity are verified at the same time;2) the mutual attestation not only between the mobile user and the network Agent,but also between the mobile users are provided.Analysis shows that the improved scheme can meet the anonymous requirement.
出处 《计算机应用》 CSCD 北大核心 2011年第11期2950-2953,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(71071028) 高等学校博士学科点专项科研基金资助项目(20100042110025)
关键词 无线网络 可信移动节点 可信计算 身份认证 匿名性 wireless network trusted mobile node trusted computing identity authentication anonymity
  • 相关文献

参考文献10

  • 1CAIMU T, OLIVER W. Mobile privacy in wireless networks revisi- ted [ J]. IEEE Transactions on Wireless Communications, 2008, 7 (3): 1035 -1042.
  • 2TIN Y S T, VASANTA H, BOYD C, et al. Protocols with security proofs for mobile applications[ C]//ACISP 2004: The 9th Australa- sian Conference on Information Security and Privacy, LNCS 3108. Berlin: Springer-Verlag, 2004:358 - 369.
  • 3杨力,马建峰,朱建明.可信的匿名无线认证协议[J].通信学报,2009,30(9):29-35. 被引量:13
  • 4杨力,马建峰,裴庆祺,马卓.直接匿名的无线网络可信接入认证方案[J].通信学报,2010,31(8):98-104. 被引量:6
  • 5Trusted Computing Group. TCG specification architecture overview [EB/OL]. [2011-04- 12]. http://www, trustedcomputing- group, org, 2007.
  • 6吴振强,周彦伟,乔子芮.移动互联网下可信移动平台接入机制[J].通信学报,2010,31(10):158-169. 被引量:9
  • 7彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 8姜奇,马建峰,李光松,刘宏月.基于身份的异构无线网络匿名漫游协议[J].通信学报,2010,31(10):138-145. 被引量:9
  • 9CHEN L Q, LOHR H, MANULIS M, et al. Property-based attesta- tion without a trusted third party [ C]// Proceedings of the 11th In- ternational Conference on Information Security. Berlin: Springer- Verlag, 2008:31-46.
  • 10BELLARE M, ROGAWAY P. Random oracles are practical: A par- adigm for designing efficient protocols[ C]//CCS'93: Proceedings of the 1 st ACM Conference on Computer and Communications Security. New York: ACM, 1993:62-73.

二级参考文献73

共引文献76

同被引文献22

  • 1郑宇,何大可,何明星.基于可信计算的移动终端用户认证方案[J].计算机学报,2006,29(8):1255-1264. 被引量:40
  • 2TCG. TCG Mobile Trusted Module Specification[S]. TCG. 2010.
  • 3Zhang Xin-wen, Aclicmez O, Seifert J-P. A trusted mobile phone reference architecture via secure kernel[C]//Proceedings of the 2007 ACM workshop on Scalable trusted computing. ACM: Al- exandria, Virginia, USA, 2007 : 7-14.
  • 4Winter J. Trusted computing building blocks for embedded li- nux-based ARM trustzone platforms[C] // Proceedings of the 3rd ACM workshop on Scalable trusted computing. ACMt Alex- andria, Virginia, USA, 2008: 21-30.
  • 5Dietrich K, Winter J. Implementation Aspects of Mobile and Em- bedded Trusted Computing[C]//Proceedings of the 2nd Inter- national Conference on Trusted Computing. Oxford, UK: Springer-Verlag, 2009 : 29-44.
  • 6Dietrich K. An integrated architecture for trusted computing for java enabled embedded devices[C]// Proceedings of the 2007ACM workshop on Scalable trusted computing. ACM: Alexan- dria , Virginia, USA, 2 0 0 7 : 2-6.
  • 7Dietrich K. Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation [C]//Proceedings of INTRUST 2009,2010. Oxford, UK: Springer-Verlag, 2010 : 88-103.
  • 8Microsystems S. Java Card(TM) Specification 2. 2. 2[S]. Final Release. March 2006.
  • 9Dietrich K. Anonymous RFID authentication using trusted com- puting technologies [C]//Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues. Istanbul, Turkey: Springer-Verlag, 2010 : 91-102.
  • 10Aaraj N, Raghunatban A, Jha N K. Analysis and design of a hardware/software trusted platform module for embedded sys- tems[J]. ACM Transactions on Embedded Computing Systems, 2009,8(1) :1-31.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部