期刊文献+

高效异构融合网络认证协议的研究与分析

Research and Analysis on Efficient Authentication Protocols for Heterogeneous Integrated Network
下载PDF
导出
摘要 针对异构融合网络认证协议的效率和安全性不能兼顾的问题,提出了一种高效的认证协议,该协议包括全认证过程和快速重认证过程。通过全认证过程减少消息交互数量,快速重认证过程减少认证实体相结合的方式降低认证延迟,利用哈希链的随机性和单向性来保证信息的安全性和新鲜性。采用了形式化分析工具AVISPA对协议的安全性进行分析,同时与现有协议进行对比,结果分析表明,该认证协议在保证安全性的基础上提高了认证效率,有效改善了异构融合网络的性能。 Efficiency and safety can’t all take into account in normal authentication protocol. Aiming at the problem in heterogeneous integrated network, this paper proposes an efficient authentication protocol which includes full authentication procedure and fast re-authentication procedure. This paper reduces the authentication delay by reducing the number of message interactions in full authentication and reducing the number of authentication entities in fast re-authentication. And this paper uses hash chain method to ensure the safety and freshness of information. Using a formal analysis tools of AVISPA to analyze the security of protocol, and compared with the existing authentication protocols to analyze the efficiency, the analysis results show that the proposed protocol improves the authentication efficiency while ensuring the security, and improves the performance of heterogeneous integrated network.
出处 《计算机科学与探索》 CSCD 北大核心 2015年第3期330-337,共8页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金~~
关键词 认证协议 认证延迟 哈希链 AVISPA authentication protocol authentication delay hash chain AVISPA
  • 相关文献

参考文献4

二级参考文献12

  • 1徐梦茗,肖聪,唐六华,黄金涛.安全协议和网络攻击分析[J].信息安全与通信保密,2007,29(2):50-51. 被引量:7
  • 2AVISPA Team, HLPSL Tutorial, European Community under the Information Society Technologies ProgramEEB/OL]. (2005-10-1).http://www. avispa-project. org.
  • 3AVISPA Team. AVISPA V1. 0 User Manual. European Community under the Information Society Technologies Program[EB/OL]. (2005-10-1).http://www. avispa-project.org.
  • 4[1]Clark J.A Survey of Authentication Protocol[M].Version 1.0.Literature:Jeremy Jacob,17 November 1997:23-42.
  • 5[2]Abadi M.Secrecy by typing in security protocols[J].Journal of the ACM:46(5),September 1999.32-34.
  • 6[3]Ryan P,Schneider S.Modelling and Analysis of Security Protocols[M].Version 1.0.China Machine Press,2005:161-162.
  • 7A. Salkintzis, C. Fors, 17,. Pazhyznnur." WLAN-GPR, S Integration for Next--generation Mobile Data Networks," IEEE Wireless Commun, Oct 2002.
  • 8J.Arkko, H.Haverinen." Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP--AKA)," Internet Draft, draft-arkko-pppext-eap-aka- 15. txt, December 21,2004, work in progress.
  • 9Muxiang Zhang, Yuguang Fang." Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol," IEEE Transactions on Wireless Communications,p754 742,VOL.4,2005.
  • 10尤明厚,陶小峰,张平,韩娟,徐瑨,李立华.一种新颖的低复杂度MIMO-BICM迭代接收机设计[J].电子学报,2007,35(B06):127-130. 被引量:2

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部