期刊文献+

异构无线网络中基于自更新哈希链的不可否认性计费协议

Non-repudiable Billing Protocol Based on Self-updating Hash Chain for Heterogeneous Wireless Networks
下载PDF
导出
摘要 异构无线网络融合是下一代网络发展的必然趋势,UMTS、LTE、WiMAX和WiFi等无线网络既相互竞争,又相互补充。安全计费是异构无线网络商用面临的主要挑战。提出了一种在异构网络中基于自更新哈希链的不可否认性计费协议,即通过采用新颖的自更新哈希链,移动终端能够快速更新可用哈希链,保证连续的快速认证。提出的方案能够提供解决计费纠纷的证据,实现计费的不可否认性、机密性和准确性。理论分析和性能仿真表明,提出的方案具有计算开销低、通信时延小等优势,满足异构无线网络的性能要求。 The integration of heterogeneous wireless networks(HWNs)is an inevitable trend in the development of next-generation networks.UMTS,LTE,WiMAX,WiFi and other wireless networks compete and cooperate mutually.Secure billing is the primary challenge faced by the commercialization of HWNs.We proposed a non-repudiable billing protocol based on the self-updating hash chain for HWNs.By using the novel self-updating hash chain technology,mobile stations(MS)can quickly update available hash chain which ensures continuous fast authentication.The proposed protocol provides the evidence to solve billing disputes,therefore,it achieves non-repudiation,confidentiality and accuracy in billing.Moreover,the theoretical analysis and performance simulation demonstrate that the proposed protocol has some advantages in aspects of low computational cost,lightweight delay and can meet the performance requirements of HWNs.
出处 《计算机科学》 CSCD 北大核心 2015年第3期111-116,共6页 Computer Science
基金 国家自然科学基金资助项目(61202352) 国家博士后基金资助项目(2013T60543 2012M521088) 江苏省自然科学基金资助项目(BK20141404) 教育部博士点基金资助项目(20123219120030) 南京理工大学"紫金之星"项目(2013ZJ0209)资助
关键词 安全计费 不可否认性 异构无线网络 自更新哈希链 Secure billing Non-repudiation Heterogeneous wireless networks Self-updating hash chain
  • 相关文献

参考文献15

  • 1姜奇,马建峰,李光松,马卓.基于WAPI的WLAN与3G网络安全融合[J].计算机学报,2010,33(9):1675-1685. 被引量:18
  • 2Prabhavathi P, Nithyanandan L. Network selection in wireless heterogeneous networks[C]//Proceedings of 2013 International Conference on Communications and Signal Processing. Melma- ruvathur, 2013 : 357-361.
  • 3He Dao }ing,Chen Chun,Bu .lia-jun,et al. Security and Efficien- cy in Roaming Services for Wireless Networks: Challenges, Ap- proaches, and Prospects [J].IEEE Communications Magazine,2013,51(2):142-150.
  • 4Rainer S, Christoph R. On the Security of the Non-Repudiation of Forwarding Service[C] // Proceedings of 2012 International Conference on Trust, Privacy and Security in Digital Business. Vienna, Austria, 2012 : 167-178.
  • 5Wu Wei,Zhou Jian-ying,Xiang Yan, et al. How to achieve non repudiation of origin with privacy protection in cloud computing [J]. Journal of Computer and System Sciences, 2013, 79 (8) : 1200-1213.
  • 6Xiao Zhi feng, Xiao Yang, Du D. Non-repudiation in neighbor- hood area networks for smart grid[J]. IEEE Communications Magazine, 2013,51(1) : 18-26.
  • 7Im T, Lee H, Cho K, et al. Secure Mutual Authentication and Fair Billing for Roaming Service in Wireless Mobile Networks [C] // Proceedings of the Third International Conference on Convergence and Hybrid Information Technology. Busan, 2008: 466-471.
  • 8Zhu Hao-iin, Lin Xiao-dong, Shi Ming-hui, et al. PPAB: A Priva- cy-Preserving Authentication and Billing Architecture for Met ropolitan Area Sharing Networks[J]. IEEE Transactions on Ve- hicular Technology, 2009,58 (5) : 2529-2543.
  • 9Fu An-rain, Zhang Yu-qing, Zhu Zhen chao, et al. An efficient handover authentication scheme with privacy preservation for IEEE 802. 16m network[J]. Computers :: Security, 2012, 31 (6) :741-749.
  • 10BS ISO/IEC. 13888-1/2 Information technology-Security tech- niques- Non-repud{ation[S]. Switzerland: The Standards Policy and Strategy Committee, 2009.

二级参考文献45

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 2Gustafsson E,Johnson A.Always best connected.IEEE Wireless Communications,2003,10(1):49-55.
  • 33GPP TS 23.234.3GPP system to Wireless Local Area Network (WLAN) interworking;System description.2008.
  • 43GPP TS 23.402.Architecture enhancements for non-3GPP accesses.2010.
  • 5Shin M,Ma J,Mishra A,Arbaugh W.Wireless network security and interworking.Proceedings of the IEEE,2006,94(2):455-466.
  • 63GPP TS 33.102.3G security;Security architecture.2009.
  • 7IEEE 802.11i.IEEE standard for Information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements-part 11:Wireless LAN medium access control and physical layer specifications amendment 6:Medium access control security enhancements.2004.
  • 8中华人民共和国国家标准.GB 15629.11-2003/XG1-2006 (信息技术-系统间远程通信和信息交换-局域网和城域网-特定要求第11部分:无线局域网媒体访问控制和物理层规范).2006.
  • 93GPP TS 33.234.3G Security;Wireless Local Area Network (WLAN) interworking security.2008.
  • 10Arkko J,Haverinen H.Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA).The Internet Society RFC 4187,2006.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部