期刊文献+

一种WLAN Mesh网络漫游接入认证协议 被引量:2

A Roaming Access Authentication Protocol in WLAN Mesh Network
下载PDF
导出
摘要 针对WLAN Mesh网络节点漫游接入过程中现有协议的不足,通过利用EMSA(efficient mesh security association)初始认证过程中所建立的安全链路和消息认证码技术,并引入修改后的DH(Diffie Hellman)密钥交换过程,提出了一种能有效满足漫游接入性能和安全性需求的接入认证协议。该协议不仅具有基本的SK(session key,会话密钥)安全属性,还具有较小的接入时延,能够适应Mesh网络拓扑变化的特性,在完成双向接入认证过程的同时,完成了密钥的生成,并能较好地隐藏终端节点的身份信息。 The currently protocols about WLAN mesh network node have some deficiency in roaming access process.Based on the security links which was established by EMSA initial authentication process and the message authentication code technology,the improved DH key exchange process is introduced.A new access authentication protocol which can effectively conform to the performance and security in roaming access process is proposed.The proposed protocol not only has the basic SK security,but also has a smaller delay.Moreover,the protocol is suitable to the mesh networks with the characteristic of topology change.The finished mutual access authentication process also complete the key generation,and the protocol can better hide the ID information of the terminal node.
出处 《电信科学》 北大核心 2012年第2期104-109,共6页 Telecommunications Science
基金 国家自然科学基金资助项目(No.60872002) 江苏省高校自然科学基金资助项目(No.11KJB510021 No.10KJB510021) 南通大学研究生科技创新计划基金资助项目(No.YKC10022)
关键词 漫游接入 DH密钥交换 可证安全性 roaming access DH key exchange provable security
  • 相关文献

参考文献9

  • 1彭清泉,裴庆祺,庞辽军,马建峰.一种WLAN Mesh网络快速切换认证方法[J].江苏大学学报(自然科学版),2010,31(4):458-463. 被引量:3
  • 2杨超,曹春杰,王巍,马建峰.一种新的Mesh网络漫游接入协议[J].吉林大学学报(工学版),2008,38(2):423-428. 被引量:1
  • 3Chi Kuang-hui, Shih Yung-chien, Liu Ho-han, et al. Fast handoff in secure IEEE 802.11s mesh networks. IEEE Transactions on Vehicular Technology, 2011, 60(1): 219-232.
  • 4Li Nan. Research on Diffie-Hellman key exchange protocol. Proceedings of the 2nd International Conference on Computer Engineering and Technology, Chengdu, China, 2010:634-637.
  • 5Bellare M, Canetti R, Klawczyk H. A modular approach to the design and analysis of authentication and key-exchange protocols. Proceedings of the 30th Annual Symposium on the Theory of Computing, New York, USA, 1998:419-428.
  • 6彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 7Boneh D. The decision Diffie-Hellman problem. Lecture Notes in Computer Science, 1998(1423):48-63.
  • 8Zhang Fan, Ma Jianfeng, Moon S J, et al. The security proof of a 4-way handshake protocol in IEEE 802.11i. Lecture Notes in Computer Science, 2005(3802): 488-493.
  • 9朱辉,李晖,杨加喜,王育民.一种可证明安全的通用多信任域认证协议[J].武汉大学学报(信息科学版),2008,33(10):1051-1054. 被引量:4

二级参考文献39

  • 1彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 2陈炜,龙翔,高小鹏.一种用于移动IPv6的混合认证方法[J].软件学报,2005,16(9):1617-1624. 被引量:12
  • 3彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 4冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学(E辑),2007,37(2):223-237. 被引量:14
  • 5Mishra A,Shin M H,Petroni N L,et al.Proactive key distribution using neighbor graphs[J].IEEE Wireless Communications,2004,11 (1):26-36.
  • 6Pack S,Jung H,Kwon T,et al.SNC:a selective neighbor caching scheme for fast handoff in IEEE 802.11 wireless networks[J].ACM Mobile Computing and Communications Review,2005,9 (4):39-49.
  • 7IEEE Standard 802.11r.Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications,Amendment 2:Fast Basic Service Set(BSS) Transition[S].Piscataway:IEEE Computer Society,2005.
  • 8Hur J,Park C,Yoon H.An efficient pre-authentication scheme for IEEE 802.11-based vehicular networks[C] ∥Proceedings of Advances in Information and Computer Security-Second International Workshop on Security 2007.Germany:Springer Verlag,2007:121-136.
  • 9Komarova M,Riguidel M,Hecker A.Fast re-authentication protocol for inter-domain roaming[C] ∥Procee-dings of the 18th Annual IEEE International Symposium on Personal,Indoor and Mobile Radio Communications.Piscataway:IEEE,2007:1-5.
  • 10Li C S,Tseng Y C,Chao H C,et al.A neighbor ca-ching mechanism for handoff in IEEE 802.11 wireless networks[J].Journal of Supercomputing,2008,45 (1):1-14.

共引文献59

同被引文献35

  • 1AKYILDIZ F, WANG Xu-dong, WANG Wei-lin. Wireless mesh net- works: a survey[J]. Computer Networks,2005,47(4) :445-487.
  • 2HU Zhi-yuan, DENG Jian-liang, CHANG Ying-hua,et aL Design and analysis of reliability wireless mesh network [ C ]//Proc of Internatio- nal Conference on Computer Science and Service System. 2011:3128- 3131.
  • 3ALRAYES M, TRIPATHI R, TYAGI N, et al. Enhancement of route maintenance in AODV over hybrid wireless mesh network [ C ]//Prec of the 1 st International Conference on Recent Advances in Information Technology. 2012:276-278.
  • 4LIU Shu-xin, PENG Jian-hua, LIU Cai-xia. Analysis of wireless mesh network security based on node functio'n[ C]//Proc of the 7th Interna- tional Conference on Computational Intelligence and Security. 2011 : 648-652.
  • 5KHAN S, ALRAJEH N A, LOOK K. Secure route selection in wireless mesh networks [ J]. Computer Nelworks,2012,56(2):491-503.
  • 6DONG Jing, CURTMOLAB R, NITA-ROTARU C. Secure network coding for wireless mesh networks : threats, challenges, and direc- tions [ J]. Computer Communications ,2009,32 ( 17 ) : 1790-1801.
  • 7AI ISLAM A, RAGHUNATHAN V. End-to-end congestion control in wireless mesh networks using a neural network [ C ]//Pioc of IEEE Wireless Communications and Networking Conference. 2011:677-682.
  • 8VURAL S,WEI D L, MOESSNER K. Survey of experimental evalua- tion studies for wireless mesh network deployments in urban areas to- wards ubiquitous Internet [ J]. IEEE Communications Surveys & Tutorials ,2013,1 5( 1 ) :223-239.
  • 9REDDY K, NALLA D. Identity based authenticated group key agree- ment protocol[ C ]//Progress in Cryptology. 2002:215-233.
  • 10BRESSON E, CHEVASSUT O, PO1NTCHEVAL D. Provably-secure authenticated group Diffie-Hellman key exchange [ J ]. ACM Trans on information and System Security,2007,10 (3) : 1-44.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部