期刊文献+

基于IPv6的P2P-SIP可证明安全无证书匿名通信协议

Provably secure certificateless anonymous authentication protocol for P2P-SIP based on IPv6
下载PDF
导出
摘要 依照下一代网络协议的发展趋势,分析IETF提出的SIP协议和P2P网络结合的P2P-SIP网络的特点,针对其优势和不足提出一个基于椭圆曲线算法并适用于IPv6的P2P-SIP无证书匿名通信协议,使用CK安全模型对方案的安全性进行了证明.对协议的安全性分析表明,该协议具有相互认证、完美前向保密性、匿名性、已知密钥安全、非密钥泄露伪装等安全属性;协议可抵御已知密钥攻击、中间人攻击、SYBIL攻击等攻击.通过与已知协议的比较可知,该协议有更好的安全性和效率. Following the developmental trend of the next-generation-network protocols,we analyze the characteristics of the P2P-SIP network which combines the SIP protocol and P2P networks.Considering its strengths and weaknesses,we design a certificateless anonymous protocol based on elliptic curve algorithms for P2P-SIP,which can be applied in IPv6 network.We prove the proposed protocol under the CK security model and do security analysis on the protocol.The security analysis demonstrates that the proposed protocol has the following security attributes: mutual authentication,excellent forward secrecy,anonymity,known key security,and key compromise impersonation.The proposed protocol can also effectively resist the known-key attack,Man-in-the-middle attack,SYBIL attack,and some other attacks.We compare our protocol with previous protocols and show that our protocol has more security attributes and more effective than the previous protocols.
出处 《中国科学院大学学报(中英文)》 CAS CSCD 北大核心 2013年第4期547-554,共8页 Journal of University of Chinese Academy of Sciences
基金 国家自然科学基金(60970140) 北京市自然科学基金(4122089)资助
关键词 对等网络-线令控制 无证书 椭圆曲线密码学 IPv6 匿名 P2P-SIP certificateless elliptic curve cryptography IPv6 anonymous
  • 相关文献

参考文献3

二级参考文献29

  • 1姬宁,林晓,普杰信.一种基于SIP安全认证机制的研究[J].计算机应用,2007,27(3):616-618. 被引量:7
  • 2Kent S, Atkinson R. Security Architecture for the Internet Protocol. IETF, RFC2401. 1998
  • 3Bremler-Barr A, Levy H. Spoofing prevention method. In: Proc IEEE INFOCOM. Washington: IEEE, 2005. 536-547
  • 4Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. IETF, RFC2827. 2000
  • 5Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM Comput Commun Rev, 2001, 31 (4): 15-26
  • 6Li j, Mirkovic J, Wang M, et al. SAVE: source address validity enforcement protocol. In: Proc IEEE INFOCOM. Washington: IEEE, 2002. 3:1557-1566
  • 7Jin C, Wang H. Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proc ACM CCS. New York: ACM, 2003. 30-41
  • 8Snoeren A, Partridge C, Sanchez L, et al. A Hash-based IP traceback. ACM SIGCOMM Comput Commun Rev, 2001, 31(4): 3-14
  • 9Lee H, Thing V, Xu Y, et al. ICMP traceback with cumulative path, an effcient solution for IP traceback. Infor- mation and Communications Security. Berlin: Springer, 2003. 124-135
  • 10Savage S, Wetherall D, Karlin A, et al. Pratical network support for IP traceback. ACM SIGCOMM, Comput Commun Rev, 2000, 30(4): 295-306

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部