期刊文献+

基于多属性的移动终端安全接入网络认证协议 被引量:3

A SECURITY ACCESS NETWORK AUTHENTICATION PROTOCOL FOR MOBILE DEVICES BASED ON MULTI-ATTRIBUTE
下载PDF
导出
摘要 很多网络安全事件是由恶意用户具有较大访问的权限而引起的。为预防网络恶意行为的发生,首先解决好网络安全接入认证。基于此,提出一个基于多属性的移动终端安全接入网络认证协议。该协议将移动设备属性和用户属性映射为一个网络访问标识符,在移动设备和网络之间建立一个双向认证过程,并支持设备的移动性。另外网络在移动终端的访问过程中采取定期认证检验,避免假冒用户现象发生。仿真实验表明,该协议具有较好的安全性和较短的认证延时。 Many network security events are caused by malicious users which have greater access privileges. In order to prevent the occurrence of malicious behaviour in networks, the first is to solve the network security access authentication. Based on this concept, we present a multi-attribute based mobile terminal security access network authentication protocol. The protocol maps the attributes of both mobile devices and users to a network access identifier, sets up a mutual authentication process between the mobile devices and the networks, and the protocol supports the equipment mobility as well. Besides, the network will authenticate regularly the mobile terminal in its access process to avoid the fake user. Simulation results show that this authentication protocol has better security and a shorter authentication delay.
作者 滕震方
出处 《计算机应用与软件》 CSCD 北大核心 2013年第8期43-46,共4页 Computer Applications and Software
基金 国家自然科学基金资助项目(61170017)
关键词 安全接入 移动设备 认证协议 Security access Mobile equipment Authentication protocol
  • 相关文献

参考文献15

  • 1Mo L,Kumbesan S.A proxy based authentication localisation schemefor handover between non trust-associated domains[J].ACM SIGMO-BILE Mobile Computing and Communications Review4 2010,13(4):47-58.
  • 2Toshikazu N.*A distributed authentication mechanism for sharing an o-verlay network among multiple organizations.[C] //Proceedings of the12th International Conference on Information Integration and Web-based Applications & Services,2010:813-817.
  • 3刘伟,杨林,戴浩,侯滨.一种新的网络接入控制方法及其认证会话性能分析[J].计算机学报,2007,30(10):1806-1812. 被引量:10
  • 4张焕国,陈璐,张立强.可信网络连接研究[J].计算机学报,2010,33(4):706-717. 被引量:75
  • 5Monis A,Baber A,Muzammil A K,et al.Performance evaluation ofIEEE 802.lx authentication methods and recommended usage [J].WSEAS Transactions on Communications.2008,7(3):133-143.
  • 6李晓峰,冯登国,陈朝武,房子河.基于属性的访问控制模型[J].通信学报,2008,29(4):90-98. 被引量:80
  • 7Richard K D.Adding Attributes to Role-Based Access Control [J].Computer,2010,43(6):79-81.
  • 8Wan Z,Liu J,Deng,R H.HASBE:A Hierarchical Attribute-BasedSolution for Flexible and Scalable Access Control in Cloud Computing[J],IEEE Transactions on Information Forensics and Security,2012,7(2):743-754.
  • 9Pikulkaew T,Kikuchi H.Improving efficiency in privacy-preservingautomated trust negotiation with conjunctive policies [C] //Proceedingsof the 14th International Conference on Network-Based Information Sys-tems(NBiS),2011:679-684.
  • 10Thiri W Y,Nilar T.Leveraging access control mechanism of Androidsmartphone using context-related role-based access control model [C] //Proceedings of the 7th International Conference on Networked Computingand Advanced Information Management(NCM),2011:54 一61.

二级参考文献34

  • 1周明天,谭良.可信计算及其进展[J].电子科技大学学报,2006,35(S1):686-697. 被引量:29
  • 2林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4钟勇,秦小麟,郑吉平,林冬梅.一种灵活的使用控制授权语言框架研究[J].计算机学报,2006,29(8):1408-1418. 被引量:15
  • 5张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 6SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:39
  • 7Lee Hyun-Woo,Kim Kwihoon,Ryu Won,Lee Byung-Sun.Performance of an efficient performing authentication to obtain access to public wireless LAN with a cache table//Proceedings of the IEEE International Conference on Communications (ICC'06).Istanbul,2006:2376-2381.
  • 8Arun Saha.Mart molle thinking outside the box:Extending 802.1x authentication to remote “Splitter” ports by combining physical and data link layer techniques//Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN'03).Germany,2003:324-333.
  • 9Ana Sanz Merino,Yasuhiko Matsunaga,Manish Shah.Secure authentication system for public WLAN roaming//Proceedings of the Mobile Networks and Applications.Netherlands,Springer Science+Business Media,2005:355-370.
  • 10Gianluigi Me,Daniele Pirro,Roberto Sarrecchia.A mobile based approach to a strong authentication on Web/ /Proceedings of the International Multi-Conference on Computing in the Global Information Technology-(ICCGI' 06).Bucharest,2006:67-71.

共引文献159

同被引文献29

  • 1刘百乐.基于安全SIM卡的移动通信研究[J].计算机安全,2007(11):26-29. 被引量:2
  • 2Markovi6 M, Dordevi6 G. Secure mobile government and mo- bile banking systems based on android clients[ M]//Securing electronic business processes. Fachmedien Wiesbaden:Spring- er,2013:263-273.
  • 3EI Kettani M D E C, En-Nasry B. MIdM : an open architecture for mobile identity management [ J ]. Journal of Convergence, 2011,2(2) :25-32.
  • 4Toshikazu N. A distributed authentication mechanism for sha- ring an overlay network among multiple organizations [ C ]// Proceedings of the 12th international conference on informa-tion integration and web-based applications & services. USA: [ s. n. ] ,2010:813-817.
  • 5许吉占明.基于PKI的智能卡双向身份认证机制的设计与实现[D].长沙:国防科学技术大学,2006.
  • 6Li M, Sandrasegaran K. A proxy based authentication localisa- tion scheme for handover between non trust-associated do- mains [ J]. ACM SIGMOBILE Mobile Computing and Commu- nications Review,2010(4) :47-50.
  • 7Tsai Y R, Chang C J. SIM- based subscriber authentication Mechanism for wireless local area networks [ J ]. Computer Communications, 2006,29 ( 10 ) : 1744 - 1753.
  • 8Firoozy- Najafabadi H R, Feizi- Derakhshi M. Multipurpose smart SIM card based on mobile database and location de- pendent query [ C ]//Proc of 2012 6th international conference on application of information and communication technologies. [s. 1. ] :IEEE,2012:1-5.
  • 9Kuhn D R, Coyne E J, Well T R. Adding attributes to role- based access control[ J ]. Computer,2010,43 (6) :79-81.
  • 10Hu R, Rong Beiyu, Wang Chingyue, et al. Security in wireless mul- timedia communications [ J]. IEEE Communications Magazine, 2014,252(3 ) :56-57.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部