期刊文献+

移动通信网中的端端保密通信 被引量:2

Secret End-to-End Communications in Mobile Networks
下载PDF
导出
摘要 移动通信网络应用范围的不断扩展和新型业务的涌现需要有更多的特殊安全协议来保障其安全性 .YiMu和VijayVaradharajan提出了两种分别应用于同一服务区和不同服务区的端端保密通信协议[1,2 ] .本文首先分析了其不足之处 ,然后设计了同时适用于同一归属局和不同归属局移动用户之间进行保密通信的安全协议 (分别称为域内和域间保密通信协议 ) ,最后 ,分析了上述协议的各项性能 .与原有协议相比 ,本文所提出的协议不仅在安全性和其他性能上有较大改进 。 Along with the ceaseless development of application of mobile networks, higher security is required by many jumped-up services of mobile networks, and therefore, sophisticated security protocols for special cases must be designed to fulfill the demand. Two of these are proposed by Yi Mu and Vijay Varadharajan for end-to-end secret communications between two mobile subscribers in same and different service area respectively. We first analyze the defects of them, then we design two new protocols for the same purpose between inter-domain and intra-domain subscribers respectively, and their performance, especially security, is discussed after this. Compared with original ones, ours are improved not only upon security and other performance, but also on universalism and oneness.
出处 《电子学报》 EI CAS CSCD 北大核心 2004年第3期384-387,共4页 Acta Electronica Sinica
基金 国防重点实验室基金项目 (No .51 4 340 60 1 0 3DZ0 1 )
关键词 移动通信网 端端保密通信 安全协议 通信协议 CA结构 证书管理 Functions Network protocols Security of data
  • 相关文献

参考文献2

二级参考文献10

  • 1徐胜波,武传坤,王新梅.移动通信网中的认证与密钥分配[J].电子学报,1996,24(10):107-110. 被引量:9
  • 2Belier M J, Chang L F, Yacobi Y. Privacy and Authentication on a Portable Communications System[J]. IEEE JSAC, 1993, 11(6):821-829.
  • 3Belier M J, Yacobi Y. Fully-fledged Two-way Public Key Authentication and Key Agreement for Low-cost Terminals[J]. Electronics Letters, 1993, 29(11): 999-1001.
  • 4Carlsen U. Optimal Privacy and Authentication on a Portable Communications System[J] . ACM Operating Systems Review, 1994, 28(3) : 16-23.
  • 5Mu Y, Varadharajan V. On the Design of Security Protocols for Mobile Communications[A]. In ACISP'96, LNCS 1172[C]. NSW,Australian: Springer, wollongong, 1996. 134-145.
  • 6Heui K, Moon S. AKA Protocols for Mobile Communications[A]. In ACISP'2000, LNCS 1841[C]. Berlin: Springer-Verlag, 2000.400-411.
  • 7Hirose S, Yoshida S. A User Authentication Scheme with Identity and Location Privacy[A]. In ACISP'2001, LNCS 2119[C]. Berlin:Springer-Verlag, 2001. 235-246.
  • 8Horn G, Preneel B. Authentication and Payment in Future Mobile Systems[A]. Computer Security ESORICS 1998, LNCS 1485 [C].Berlin : Springer-Verlag, 1998. 277-293.
  • 9Gong L M, Needham R M, Saltzer J. Protecting Poorly Chosen Secrets from Guessing Attacks[J]. IEEE JSAC, 1993, 11(5): 648-656.
  • 10刘东苏,韦宝典,王新梅,马文平.第三代移动通信系统的安全体系结构[J].西安电子科技大学学报,2002,29(3):351-354. 被引量:6

共引文献7

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部