期刊文献+

基于模糊属性的跨校无线漫游认证机制研究

Cross-universities wireless roaming authentication scheme based on fuzzy attribute
原文传递
导出
摘要 随着移动互联的发展,针对多个学校网络用户漫游时的认证问题,利用双线性对的特性,基于Shamir的拉格朗日差值多项式,提出了一种基于模糊属性的跨校无线漫游认证机制,方案中只有拥有不少于系统发布的授权属性集中一定个数的用户才可以被认证成功。该机制不涉及用户身份隐私信息,通过用户属性更新机制及漫游用户更新机制,对被认证用户的描述更加灵活,确保了认证的正确执行及用户信息的安全;同时不需要将用户信息返回到原属学校进行认证,提高了认证效率。分析和实践表明,此机制可抵抗中间人攻击、重放攻击和合谋攻击,可满足无线网络环境用户漫游认证的安全需求,为多个学校间学术交流和资源共享提供了保障。 For authentication issues when user takes their wireless device crossing multi-universities, based on bilinear pairings characteristics and Shamir' s Lagrange polynomial interpolation, a fuzzy attribute-based authentication scheme (FAAS) is proposed which enables the users to be authenticated only if their attributes satisfy the number of threshold of authorized attributes. Not related to the user' s privacy, and provides users with more flexible and richer in descriptions. The users and their equipment did not need to return to the home university to authenticate. This method improves the effi- ciency and proper execution of the authentication. Analyses have indicated that this scheme can resist t}2e man-in-the-mid- dle attacks, replay attacks and collusion attacks, satisfy the security requirements of wireless network, and provide a practi- cal solution for multi-universities' users and their facilities wireless roaming authentication.
出处 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2014年第6期763-770,共8页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 国家自然科学基金(61272067 61272415) 广东省自然科学基金(S2013010013728 S2012030006242) 广东省研究和技术项目(2012A080102007 2012B040305008) 广东省工程中心项目(GCZX-A1103) 广州市重点实验室开放基金(2012-224)~~
关键词 模糊属性认证机制(FAAS) 无线漫游 跨校 拉格朗日多项式 门限 秘密分享 fuzzy attributes authentication scheme(FAAS) wireless roaming cross-universities Lagrange polynomial in-terpolation threshold scheme secret sharing
  • 相关文献

参考文献9

  • 1常潘,沈富可.采用层次结构的认证中心实现跨校统一身份认证[J].计算机应用,2009,29(B06):36-37. 被引量:1
  • 2TIAN Fu L, TZONELIH H. Provably secure and efficient authentication techniques for the global mobility nctwork [ J ]. The Journal of Systems and Software,2011,84 (10) : 1717-1725.
  • 3DAOJING H,JIAJUN B,SAMMY C,et al. Privacy-Preser- ving Universal Authentication Protocol for Wireless Com- munications[ J]. IEEE Transactions on Wireless Commu- nications, 2011,10 ( 2 ) :431-436.
  • 4JIN Jo H, HA Paik J, DONG Hoon L. Efficient Privacy- Preserving Authentication in Wireless Mobile Networks [ J ]. IEEE Transactions on Mobile Computing, 2014, 13 (7) :1469-1481.
  • 5张赫,张增修,王迎霞,刘莉,沈富可.基于跨校身份认证技术共享数字化教学资源[J].远程教育杂志,2011,29(6):18-23. 被引量:4
  • 6SAHAI Amit, WATERS Brent. Fuzzy identity-based en- cryption [ M ]. USA : Springer Berlin Heidelberg, 2005 : 457-473.
  • 7GOYAL V, PANDEY O, SAHAI A, et al. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[ C]//ACM. Proceedings of the 13th ACM confer- ence on Computer and communications security. Alexan- dria, USA : ACM, 2006 : 89-98.
  • 8YU S, WANG C, REN K, LOU W. Achieving Secure, Scalable ,and Fine-grained Data Access Control in Cloud Computing [ C ]//IEEE. INFOCOM 2010 Proceedings IEEE. San Diego, USA : INFOCOM ,2010 : 1-9.
  • 9ERBER R, SCHLAGER C, PERNUL G. Patterns for Au- thentication and Authorisation Infrastructures [ C ]// IEEE. Database and Expert Systems Applications, 2007.DEXA 18th International Workshop on. Regensburg, Ger- many:IEEE Conference Publications,2007:755-759.

二级参考文献15

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部