期刊文献+

移动网络中的独立式安全管理系统

Independent Security Management for the Mobile Network
下载PDF
导出
摘要 本文提出一种适用于移动网络的安全管理系统 ,由于访问网络能够独立地对漫游用户进行认证 ,所以称该系统为独立式安全管理 (ISM) .基于ISM设计一种漫游用户的认证协议 ,通过对协议的比较分析可以看出 ,相对于其它安全管理系统 ,ISM的突出优点是安全责任划分清晰。 This paper proposes a new security management system for the mobile network,which uses the asymmetric cryptosystems to authenticate the mobile users.As the visited network can authenticate the user independently in roaming,the system is called independent security management (ISM).An authentication protocol based upon ISM is given.As shown in our analysis,the greatest advantage of ISM over other security managements is that the security responsibility is made clear and the authentication procedure is more efficient.
出处 《电子学报》 EI CAS CSCD 北大核心 2003年第2期255-258,共4页 Acta Electronica Sinica
基金 国家 8 63重大课题基金 (No .863 30 0 0 1 0 3 99)
关键词 移动网络 认证 漫游 安全管理 数字签名 mobile network authentication roaming security management digital signature
  • 相关文献

参考文献11

  • 1刘建伟,王育民,肖国镇.基于KryptoKnight的移动用户认证协议[J].电子学报,1998,26(1):93-97. 被引量:7
  • 2D Brown. Techniques for privacy and authentication personal communication systems [J]. IEEE Personal Commnn, 19951.
  • 3TIA/EIA IS--41. Cellular Radio Telecommunications Intersystem Operations [S]. 1991.
  • 4TIC JJ-70.10. Personal Digital Cellular Digital Mobile Communication Networks inter-Node Interface-Mobile Application Par [ S]. 1995.
  • 5Shigefusa Suzuki, Kazuhiko Nakada. An authentication technique based on distributed security management for the global mobility network[J]. IEEE Journal on select, 1997:1608 - 1617.
  • 6Liu Jian-wei, Wang Yu-min. A user authentication protocol for digital mobile communication network [ A ]. Seventh IEEE International Symposium on Personal, Indoor and Mobile Radio Communications [ C ].1996.
  • 7M J Beller, et al. Privacy and authentication on portable communication system [ J ]. IEEE J. on SAC, August 1993,11 (6) : 821 - 829.
  • 8A Aziz, W Diffie. Privacy and authentication for wireless local area networks [J].IEEE Personal commun,First Quarter 1994:25-31.
  • 9Kim S, et al. Proxy signatures, Revisited [ A ]. ICICS' 97 [ C ]. 1997.223 - 232.
  • 10ITU-T, Draft Recommendation Q. ASEC. Security Mechanisms and Protocols for Protecting the Access to Network Services [S]. 1997.

二级参考文献2

  • 1刘建伟,Proceedings of PIMRC’95,1995年,608页
  • 2Lin H Y,ACM Comput Commun Rev,1995年,25页

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部