期刊文献+

对无线网络移动认证协议的分析与改进 被引量:3

WIRELESS NETWORK MOBILE AUTHENTICATION PROTOCOL ANALYSIS AND IMPROVEMENT
下载PDF
导出
摘要 文献[5,6]利用基于椭圆曲线的信任授权机制设计了适用于无线移动设备的高效认证体制。从匿名性和会话密钥更新的角度分析该方案的缺陷。在不增加本地注册中心HLR、漫游地注册中心VLR和移动终端MS额外负担的前提下,提出了改进方案,加强方案的匿名性和密钥更新能力:一方面VLR无法获悉MS的身份信息;另一方面,MS和VLR可以更新它们的会话密钥,即使在HLR离线的情况下。提出的改进方案保持了原方案的高效性和其它优点。 In reference documents ,by exploiting elliptic curve based trust delegation mechanism,an efficient authentication mechanism suitable for wireless mobile devices is presented.In terms of anonymity and secure key update,the weaknesses of the scheme are analyzed.Without imposing extra burdens on HLR(home location network),VLR(visited location network) or MS(mobile station),an improved scheme is proposed that strengthens the scheme's secrecy and the encryption key's update capability: on the one hand VLR is prohibited from acquiring MS's identification information,on the other hand MS and VLR can update their session keys even when HLR is offline.The improved scheme preserves efficiency and other merits of the original scheme.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第3期19-21,111,共4页 Computer Applications and Software
基金 国家自然科学基金项目(60873217 61070249)
关键词 无线网络 移动认证 匿名性 安全密钥更新 后向保密性 Wireless network Mobile authentication Anonymity Secure key update Backward secrecy
  • 相关文献

参考文献10

  • 1Molva R,Samfat D,Tsudik G.Authentication of mobile users[J].IEEE Network,1994,8(2):26-34.
  • 2Samfat D,Molva R,Asokan N.Untraceability in mobile networks[C]//Proc.International Conference on Mobile Computing and Networking,1995:26-36.
  • 3He Q,Wu D,Khosla P.Quest for personal control over mobile location privacy[J].IEEE Commun.Mag.,2004,42(5):130-136.
  • 4Lee W,Yeh C.A new delegation-based authentication protocol for use in portable communication systems[J].IEEE Transactions on Wireless Communications,2005,4(1):57-64.
  • 5Tang C,Wu D.An Efficient Mobile Authentication Scheme for Wireless Networks[J].IEEE Transactions on Wireless Communications,2008,7(4):1408-1416.
  • 6Tang C,Wu D.Mobile Privacy in Wireless Networks-Revisited[J].IEEE Transactions on Wireless Communications,2008,7(3):1035-1042.
  • 7Zhang M,Fang Y.Security analysis and enhancements of3GPP authen-tication and key agreement protocol[J].IEEE Transactions on Wireless Communications,2005,4(2):734-742.
  • 8TS33.102.Security architecture,version4.2.0,release4[S].Third Generation Partnership Project-Technical Specification Group,2001.
  • 9TR33.902.Formal analysis of the3G authentication protocol[S].Third Generation Partnership Project-Authentication and Key Agree-ment(AKA),2000.
  • 10Hughes D,Shmatikov V.Information Hiding,Anonymity and Privacy:A Modular Approach[J].Journal of Computer Security,2004,12(1):3-36.

同被引文献19

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部