期刊文献+

装备保障信息网络身份认证体系研究 被引量:3

The Identity Authentication Architecture for Equipment Support Information Network
下载PDF
导出
摘要 针对装备保障信息网络中的身份认证问题,从网络层次、认证服务和认证方式3个维度,构建了装备保障信息网络的身份认证体系.根据装备保障的业务流程和装备保障信息网络的组网方式,得到了装备保障信息网络的层次结构.通过分析装备保障信息网络的网络层次及特点,总结了装备保障信息网络中需要提供的3大类身份认证服务.对能够提供这些身份认证服务的认证方式进行了总结,对其中部分认证方式进行了介绍和分析,并对如何综合运用这些认证方式进行了论证和阐述. Considering the identity authentication problem for equipment support information networks, the identity authenticationarchitecture for equipment support information networks is constructed from network layer, authentication services and authenticationmethods. The hierarchical structure of the equipment support information network is derived according to the process of equipmentsupport and the networking mode of equipment support information networks. Three categories of identity authentication servicesrequired in equipment support information networks are summarized by analyzing the layers and their characteristics of the equipmentsupport information network. Authentication methods which can provide those identity authentication services are summarized, andcomprehensive utilization of those methods is demonstrated.
出处 《指挥与控制学报》 2016年第2期134-138,共5页 Journal of Command and Control
基金 国家社会科学基金军事学项目(15GJ003-184) 国家自然科学基金(61271152)资助~~
关键词 装备保障信息网络 身份认证 网络结构 认证体系 equipment support information network,identity authentication,network structure,authentication architecture
  • 相关文献

参考文献10

  • 1杨学强,黄俊等.装备保障信息化建设概论[M].北京:国防工业出版社,2011:23-25.
  • 2张先洪,廖宇鹏,王敏杰.敌我识别对抗技术研究[J].信息安全与技术,2012,3(4):18-23. 被引量:6
  • 3李亚娟. 战术互联网无线电台子网信息安全措施的研究[J]. 信息安全与通信保密,2012(2):70-71.
  • 4ZHANG L R, LAKAS A, EI-SAYED H, et al. Mobility analysis in vehicularad hoc network (VANET) [J]. Journal of Network and ComputerApplications, 2013, 36(3): 1050-1056.
  • 5尤增录.战术互联网[M].北京:解放军出版社,2010.
  • 6姚洪磊,张彦,周泽岩.基于PKI/CA技术的铁路身份认证体系[J].中南大学学报(自然科学版),2013,44(S1):356-361. 被引量:3
  • 7HAIDAR A N, ABDALLAH A E. Formal modelling of PKI based authentication[J]. Electronic Notes in Theoretical Computer Science, 2009,235(complete): 55-70.
  • 8WANG H J,WANG Y D, HAN J H, et al. Optimization of distributed CAapplied in mobile ad hoc networks [C]// 2008 International Symposium onInformation Science and Engineering. Shanghai:IEEE, 2008: 389-392.
  • 9ZHANG T, YUE K, YAO J K. A distributed anonymous authenticationscheme for mobile ad hoc network from bilinear maps [C]//2011 InternationalConference on Mechatronic Science, Electric Engineering andComputer. Jilin: IEEE, 2011: 314-318.
  • 10SUN H M, TING W C, WANG K H. On the security of Chien’s ultralightweightRFID authentication protocol[J]. IEEE Transactions on Dependableand Secure Computing, 2011, 8(2): 315-317.

二级参考文献17

共引文献20

同被引文献8

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部