期刊文献+

网络安全协议SPWMN的安全性分析与改进

Analysis and Improvement of a Secure Key Distribution Protocol on SPWMN
下载PDF
导出
摘要 本文针对无线移动网络的会话密钥分配协议SPWMN进行安全性分析,发现消息重放攻击和反射攻击对其都是有效攻击。从而指出该协议在身份认证和提供加密预言服务方面有一定的安全缺陷,然后提出一种改进的协议SPWMN-1。改进后的协议并未增加计算开销,并且修正了SPWMN的安全缺陷,比原协议更安全实用。 This paper proposed a secure session-key distribution (SKD) protocol SPWMN for mobile communication in 2007, and analyzed the security of SPWMN and made it unworkable by replay attack and reflection attack. The reasons of such existing flaws were investigated as failure authentication and risky encryption oracle, and an improved protocol version (called SPWMN-1 protocol) was proposed in this paper. The SPWMN-1 protocol remedied the flaws while kept the original computation cost. The improved protocol is more secure and practical than original SPWMN protocol.
出处 《电脑知识与技术》 2009年第7X期5907-5909,共3页 Computer Knowledge and Technology
基金 河南教育厅08自然科学研究计划(2008B520011) 河南理工大学青年基金(646155)
关键词 会话密钥分配协议 安全性分析 消息重放攻击 反射攻击 Session-key distribution protocol Security analysis Message replay attack Reflection attack
  • 相关文献

参考文献6

  • 1姚丹霖,江国庆,王新建.一种高效的无线移动网络安全协议[J].计算机应用研究,2007,24(11):127-129. 被引量:2
  • 2J.Clark,J.Jacob.A survey of authentication protocol literature[K].wwwcsyorkacuk/~jac/papers/drareviewpsgz.2007
  • 3G.Low.Breading and fixing the Needham-Schroeder public-key authentication protocol[].Information Processing Letters.1995
  • 4Needham R,Schroeder M.Using encryption for authentication in large networks of computers[].Communications of the ACM.1978
  • 5Denning DE,Sacco GM.Timestamps in key distribution protocols[].Communications of the ACM.1981
  • 6Woo T Y C,Lam S S.Authentication for Distributed Systems[].IEEE Computer.1992

二级参考文献10

  • 1ANDREW Z.TABONA O.An overview of wireless network security[EB/OL].(2005-08-04).[2005-10-17].http://www.windowsnetworking.com/ pages/article_p.asp?id=421.
  • 2NEEDHAM R,SCHROEDER M.Using encryption for authentication in large networks of computers[J].Communications of the ACM,1978,21(12):993-999.
  • 3AJMANI S,MORRIS R,LISKOV B.A trusted third-party computation service[R].MIT:LCS Publication,2001:1-17.
  • 4GENNARO R,LINDELL Y.A framework for password-based authenticated key exchange[C]//Proc of EUROCRYPT 2003.Heidelberg:Springer-Verlag,2003:524-543.
  • 5ILIEV A,SMITH S.Towards tiny trusted third parties[R].[S.l.]:Dartmouth Computer Science,2005:1-26.
  • 6SCHLICHTING R D,SCHNEIDER F B.Fail-stop processors:an approach to designing fault-tolerant computing systems[J].ACM Transactions on Computing Systems,1983,1(3):222-238.
  • 7GONG L,SYVERSON P F.Fail-stop protocols:an approach to designing secure protocols[C]//Proc of IFIP DCCA-5.Oakland:IEEE Computer Society Press,1985:44-55.
  • 8GARCIA-LUNA-ACEVES J J.A fail-safe routing algorithm for multihop packet-radio networks[C]//Proc of IEEE INFORCOM'86.Miami:IEEE Computer Society Press,1986:120-132.
  • 9SYVERSON P F,OORSCHOT P C van.On unifying some cryptographic protocol logics[C]//Proc of IEEE Computer Society Symposium on Research in Security and Privacy.Los Alamitos,Calif:IEEE Computer Society Press,1994:14-28.
  • 10SYVERSON P F,OORSCHOT P C van.A unified cryptographic protocol logic[R].Washington D C:NRL Publication,1996:1-29.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部