期刊文献+

基于社交网络的智能手机轻型安全认证协议设计 被引量:4

Lightweight smart phone security authentication protocol based on social network
原文传递
导出
摘要 传统的基于PKI的公钥加密认证方式,以其高的计算需求对资源受限的智能终端提出新的挑战。考虑到现实手机通讯网络具有社交网络特点,提出一种基于社交网络的智能手机轻型安全认证协议,使用Kerberos协议分发对称密钥,使用对称加密方式替换原来公钥加密方式,结合用户常用联系人数量小的特性规避了大规模密钥分发和管理问题,并使用BAN逻辑对协议安全性进行形式化分析。实验结果表明,所提协议在智能手机上运行速度快,资源需求量少,终端续航时间长。 for the resource-constrained characteristics of the smart phone,this paper proposes a lightweight smart phone security authentication protocol based on social network against the problem of PKI-based public key encryption for authentication demanding lots of terminal resource.This protocol combines with the features of users having small number of contacts,makes use of symmetric encryption instead of the original asymmetric encryption,distributes symmetric key using the Kerberos protocol,and then uses the BAN logic to conduct a formal analysis of protocol security.Experimental results show that the proposed protocol in the smart phone is faster,with less demand for resources,and has longer life for the terminal.
出处 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2013年第1期132-137,共6页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 国家科技重大专项课题(2011ZX03002-004-03) 教育部NCET 重庆市高等教育成果转化项目(Kjzh10206) 公安部信息网络安全重点实验室项目(C11609)~~
关键词 社交网络 智能手机 安全认证协议 social network smart phone security authentication
  • 相关文献

参考文献9

  • 1STEVEN F,NATHAN C,SEVASTI K. Beyond the pin:Enhancing user authentication for mobile devices[J].Computer Fraud and Security,2008,(08):12-17.
  • 2MAURO C,IRINA Z Z,BRUNO C. Mind how you answer me ! transparently authenticating the user of a smartphone when answering or placing a call[A].Hong Kong,China:ACM Press,2011.249-259.
  • 3XI Kai,AHMAD T,HAN F. A fingerprint based biocryptographic security protocol designed for client/server authentication in mobile computing environment[J].Security Comm Networks,2010,(05):487-499.
  • 4RICHARD C,MARKUS J. Authentication in the Clouds:A Framework and its Application to Mobile Users[A].New york,Ny,USA:ACM,2010.1-6.
  • 5SOLEYMANI B,MAHESWARAN M. Social Authentication Protocol for Mobile Phones.IEEE Computational Science and Engineering[A].Canada,2009.436-441.
  • 6NEUMAN B C,TO'S T. Kerberos:an authentication service for computer networks[J].IEEE Communications Magazine,1994,(09):33-38.
  • 7BURROWS M,ABADI M,NEEDHAM H. A logic of authentication[J].ACM Transactions on Computer Systems,1990,(01):18-36.
  • 8YE Qi,ZHU Tian,HU Deyong. Cell phone mini challenge award:Social network accuracy exploring temporal communication in mobile call graphs[A].Columbus,Ohio,USA,2008.207-208.
  • 9LEE Jungsan,LIN Peiyu,CHANG Chinchen. Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs[J].Wireless Personal Communications,2010,(04):569-580.

同被引文献41

  • 1刘宴兵,刘飞飞.基于云计算的智能手机社交认证系统[J].通信学报,2012,33(S1):28-34. 被引量:7
  • 2Papacharissi Z. A networked self: identity, communi- ty, and culture on social network sites [ M ]. New York : Routledge, 2011.
  • 3Brainard J, Juels A, Rivest R L, et al. Fourth-factor authentication : somebody you know [ C ]//13 th ACM Conference on Computer and Communications Securi- ty. Virginia,USA,2006 : 168 - 178.
  • 4Henk C A, van Tilborg, Jajodia S. Encyclopedia of cryptography and security [M]. New York: Springer US ,2011.
  • 5al Abdulwahid A,Clarke N, Furnell S, et al. The cur- rent use of authentication technologies: an investigative review [ C]//2015 IEEE International Conference on Cloud Computing. Riyadh, Saudi Arabia ,2015 : 1 - 8.
  • 6Javed A, Bletgen D, Kohlar F, et al. Secure fallback authentication and the trusted friend attack [ C]//2014 IEEE 34th International Conference on Distributed Computing Systems Workshops. Madrid, Spain ,2014: 22 - 28.
  • 7Schechter S,Egelman S, Reeder R W. It' s not what you know, but who you know [ C ]//Proceedings of the 27th ACM SIGCHI Conference on Human Factors in Computing Systems. Toronto, Canada, 2009 : 172 -181.
  • 8Shao C, Chert L, Fan S, et al. Social authentication identity: an alternate to internet real name system [ C ]//International Conference on Security and Priva- cy in Communication Systems. Beijing, China, 2014: 132 - 140.
  • 9Soleymani B, Maheswaran M. Social authentication protocol for mobile phones [ C ]//2009 International Conference on Computational Science and Engineer- ing. Vancouver, Canada,2009:436 - 441.
  • 10Jain S, Lang J, Gong N Z, et al. New directions in so- cial authentication [ C]//2015 Workshop on Usable Security. San Diego, USA,2015 : 1 - 6.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部