期刊文献+

无线网络接入中用户身份和位置的双重隐身机制研究 被引量:1

Research on a Dual-stealth Mechanism of User Identity and Location in Accessing Wireless Network
下载PDF
导出
摘要 由于用户位置与无线网络之间存在固有的"用户-终端-基站-位置"的时空映射关系,导致端到端匿名认证不能解决用户的位置隐私泄露问题。文章采用模糊化思想,构造基于k匿名集的身份认证模型,替代现有协议中的唯一身份标识,实现针对基站的用户身份和设备身份双重匿名保护。在此基础上,引入可信第三方,切断服务端与基站的直接关联,屏蔽用户与接入点的映射关系,解决服务端的位置隐私问题,从而实现对用户身份和位置信息的双重隐身保护。在隐身接入机制中,引入随机因子和哈希运算等来抵御多种网络攻击。文章从理论角度分析了方案的可行性和安全性。 Because of the inherent "user-terminal-BS-location" spatio-temporal mapping relationship between user location and wireless network,the end-to-end anonymous authentication can't solve the leakage problem of location privacy.This paper uses the idea of fuzzification to construct the identity authentication model with k-anonymous set identity,which replaces the unique identity in existing protocols and achieves double anonymity protection of user identity and device identity for BS.On this basis,the trusted third party is introduced to cut off the direct correlation between the server and BS,shield the mapping relationship between the user and the accessed BS,and solve the location privacy problem of the server,so as to achieve double-stealth protection of the user identity and location.In the stealth access mechanism,random factors and hash operations are introduced to resist a variety of network attacks.This paper analyzes the feasibility and safety of the scheme from a theoretical point of view.
作者 叶阿勇 李晴 金俊林 孟铃玉 YE A-yong, LI Qing, J1N Junlin, MENG Lingyu(College of Mathematics and Inforrnatics, Fujian Normal University, Fuzhou Fujian 350007, China)
出处 《信息网络安全》 CSCD 北大核心 2018年第7期29-35,共7页 Netinfo Security
基金 国家自然科学基金[61771140] 福建省自然科学基金[2018J01780] 福建省高校自然科学基金青年重点项目[JZ160430] 2015福州科技计划项目[2015-G-51]
关键词 无线网络 隐身接入 匿名认证 基于身份的密码体制 wireless network stealth access anonymous authentication identity-basedcryptosystem
  • 相关文献

参考文献8

二级参考文献107

  • 1田子建,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740. 被引量:10
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3Trusted Computing Group. Summary of features under consideration for the next generation of TPM[EB/OL]. http://www, trustedcomput- inggroup.org, 2009.
  • 4BALFE S, GALLERY E, MITCHELL C J, et al. Challenges for trusted computing[J]. IEEE Security & Privacy, 2008,6(6):60-66.
  • 5Trusted Computing Group. Trusted computing platform alliance (TCPA) main specification version 1.1b[EB/OL]. http://www, trusted- computinggroup.org, 2001.
  • 6BRICHELL E, CAMENISCH J, CHEN L Q. Direct anonymous at- testation[A]. Proceedings of the 1 lth ACM Conference on Computer and Communications Security[C]. New York, NY, USA, 2004. 132-145.
  • 7EMANUELE C, HANS L, GIANLUCA R, et al. Anonymous authen- tication with TLS and DAA[A]. TRUST 2010, LNCS 6101[C]. 2010. 47-62.
  • 8WALKER J, LI J T. Key exchange with anonymous authentication using DAA-SIGMA protocol[A]. INTRUST 2010, LNCS 6802[C]. 2011. 108-127.
  • 9CAMENISCH J, LYSYANSKAY A. Dynamic accumulators and ap- plication to efficient revocation of anonymous credentials[A]. Cryp- tology -- CRYPTO 2002[C]. Springer Verlag, 2002.61-76.
  • 10CAMENISCH J, STADLER M. Efficient group signature schemes for large groups[A]. CRYPTO '97[C]. Springer Verlag, 1997. 410-424.

共引文献60

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部