期刊文献+

可证安全的移动互联网可信匿名漫游协议 被引量:15

Provable Secure Trusted and Anonymous Roaming Protocol for Mobile Internet
下载PDF
导出
摘要 文中提出了移动互联网下移动可信终端(MTT)的可信漫游协议,协议仅需1轮消息交互即可实现MTT的匿名漫游证明,远程网络认证服务器通过验证MTT注册时家乡网络认证服务器为其签发的漫游证明信息的合法性,完成对MTT相关属性的认证,同时保证了MTT隐私信息的安全性和匿名性.最后运用CK安全模型证明了协议是会话密钥安全的,在继承传统漫游协议身份匿名性和不可追踪性的同时,具有较高的安全性、抗攻击性和通信效率. The trusted roaming protocol of Mobile Trusted Terminal (MTT) in Mobile Internet is presented in this paper. The remote network authentication server proves the legality of roaming authentication information which is signed and published by home network authentication server when its registration. The process of anonymous roaming authentication is accomplished by merely one round of messages exchange. At the same time, the safety and anonymity of the MTT privacy information can be ensured in this process. Finally, the current paper successfully proves that this protocol is SK-security by applying CK security model. This protocol not only inherits the identity anonymity and non-tracking from traditional roaming protocol, but also has high security, anti-aggression and communication efficiency.
出处 《计算机学报》 EI CSCD 北大核心 2015年第4期733-748,共16页 Chinese Journal of Computers
基金 国家自然科学基金(61272436 61402275 61303092) 保密通信重点实验室基金(9140C110206140C11050) 中国科学院信息工程研究所信息安全国家重点实验室开放课题(2015-MS-10) 陕西省自然科学基金(2014JQ8309) 中央高校基本科研业务费专项资金(GK201504016) 陕西师范大学优秀博士论文项目(X2014YB01)资助~~
关键词 移动互联网 匿名漫游认证 可信认证 CK安全模型 Mobile Internet anonymous roaming authentication trusted authentication CK security model
  • 相关文献

参考文献25

  • 1Trusted Computing Group. TPM main part 1 design prineiples specification version 1.2. https://www. Trustedcomputing- group, org/, 2003.
  • 2Trusted Computing Group. TCG mobile trusted module specification version 1.0. https:///www. Trusted comput- inggroup, org, 2007.
  • 3朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 4彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85. 被引量:26
  • 5Jiang Y X, Lin C, Shen X M. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 2006, 5(9): 2569-2577.
  • 6Yang G M, Wong D S, Deng X T. Anonymous and authen- ticated key exchange for roaming networks. IEEE Transac- tions on Wireless Communications, 2007, 6(9): 1035-1042.
  • 7Yang G M, Wong D S, Deng X T. Formal security definition and efficient construction for roaming with a privacy-preserving extension. Journal of Universal Computer Science, 2008, 14(3) : 441-462.
  • 8Shi M H, Rutagemwa H, Shen X M. A servlce-agent-based roaming architecture for WLAN/cellular integrated networks. IEEE Transactions on Vehicular Technology, 2007, 56 (5).. 3168-3181.
  • 9Jiang J, He C, Jiang L. On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless aceess//Proceedings of the International Conference on Communications, Networking and Mobile Computing. 2005:972-981.
  • 10彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57

二级参考文献167

共引文献158

同被引文献98

引证文献15

二级引证文献72

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部