期刊文献+

基于预共享密钥的LAN安全关联方案改进与分析 被引量:4

Improvement and analysis of LAN security association scheme based on pre-shared key
下载PDF
导出
摘要 针对基于预共享密钥的有线局域网(LAN)安全关联方案中交换密钥建立过程的通信浪费问题,提出了一种改进的LAN安全关联方案。该方案通过对基于预共享密钥的鉴别及单播密钥协商过程的改进,生成了新加入交换机和认证服务器之间的成对主密钥,并用于新加入交换机与各个不相邻交换机之间的交换密钥协商过程。然后,在该方案基础上提出了一种可信计算环境下的LAN安全关联方案。该方案在改进的基于预共享密钥的鉴别及单播密钥协商过程中进一步增加对终端设备的平台认证,从而实现终端设备的可信网络接入,有效增强了LAN的安全性。最后,利用串空间模型(SSM)证明了这两个LAN安全关联方案是安全的。性能对比分析结果表明,该方案有效减少了交换密钥建立过程的消息交互数和计算量。 For the communication waste of the exchange key establishment process in Local Area Network(LAN)security association scheme based on pre-shared key,an improved LAN security association scheme was proposed.A pairwise key between a new added switch and the authentication server was generated by improving the authentication and unicast key agreement process based on pre-shared key,and was used to the exchange key agreement processes between the new added switch and other nonadjacent switches.Then,on basis of the above improved scheme,a LAN security association scheme in trusted computing environment was put forward.In the improved authentication and unicast key negotiation process based on pre-shared key,the platform authentication of the terminal device was further increased,thereby realizing the trusted network access of the terminal device,and effectively enhancing the security of the LAN.Finally,the two LAN security association schemes were proved secure in the Strand Space Model(SSM).The results of performance comparison analysis show that the improved scheme reduces the number of exchanged messages and computation complexity of the exchange key agreement processes.
作者 肖跃雷 武君胜 朱志祥 XIAO Yuelei;WU Junsheng;ZHU Zhixiang(College of Computer Science,Northwestern Polytechnical University,Xi’an Shaanxi 710072,China;Shaanxi Provincial Information Engineering Research Institute,Xi’an Shaanxi 710075,China;Institute of IOT and IT-based industrialization,Xi’an University of Posts&Telecommunications,Xi’an Shaanxi 710061,China)
出处 《计算机应用》 CSCD 北大核心 2018年第11期3246-3251,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(61741216 61402367) 陕西省科技统筹创新工程计划项目(2016KTTSGY01-03) 陕西省教育厅专项科学研究项目(17JK0704) 西安邮电大学"西邮新星"团队支持计划项目~~
关键词 有线局域网 可信计算 平台认证 串空间模型 安全关联 Local Area Network(LAN) trusted computing platform authentication Strand Space Model(SSM) security association
  • 相关文献

参考文献4

二级参考文献16

  • 1沈继锋,刘同明.一种交换式网络内的ARP欺骗的解决方案[J].现代计算机,2006,12(1):39-41. 被引量:5
  • 2林洪波.关注网络中的数据链路层攻击[J].计算机时代,2006(4):36-37. 被引量:2
  • 3黄振海,郭宏,王育民等.GB15629.11-2003《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范》.北京,中国标准出版社,2003.
  • 4赖晓龙,曹军,铁满霞等.GB15629.11-2003/XG1-2006《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单》,北京:中国标准出版社,2006年.
  • 5Cremers C. On the Protocol Composition Logic PCL. http: //arxiv.org/abs/0709.1080v4, 2007.
  • 6Mitchell J C, Shmatikov V, and Stern U. Finite-state analysis of ssl 3.0. Proceedings of the Seventh USENIX Security Symposium, San Antonio, 1998: 201-216.
  • 7Datta A, Derek A, and Mitchell J C, et al.. A derivation system for security protocols and its logical formalization. Proceedings of 16th IEEE Computer Security Foundations Workshop, Asilomar, 2003: 109-125.
  • 8Datta A, Derek A, and Mitchell J C, et al.. A derivation system and compositional logic for security protocols. Journal of Computer Security, 2005, 13(3): 423-482.
  • 9Derek A. Formal analysis of security protocols: Protocol composition logic. [Ph.D. dissertation], Computer Science Department, Stanford University, December 2006.
  • 10Durgin N, Mitchell J C, and Pavlovic D. A compositional logic for proving security properties of protocols. Journal of Computer Security, 2003, 11(4): 677-721.

共引文献15

同被引文献34

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部