期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A Secure and Efficient Handover Authentication and Key Management Protocol for 5G Networks 被引量:1
1
作者 Jiaqi Huang Yi Qian 《Journal of Communications and Information Networks》 CSCD 2020年第1期40-49,共10页
As a major component of thefifth-generation(5G)wireless networks,network densification greatly increases the network capacity by adding more cell sites into the network.However,the densified network increases the hand... As a major component of thefifth-generation(5G)wireless networks,network densification greatly increases the network capacity by adding more cell sites into the network.However,the densified network increases the handover frequency of fast-moving mobile users,like vehicles.Thus,seamless handover with security provision is highly desirable in 5G networks.The third generation partnership project(3GPP)has been working on standardization of the handover procedure in 5G networks to meet the stringent efficiency and security requirement.However,the existing handover authentication process in 5G networks has securityflaws,i.e.vulnerable to replay and de-synchronization attacks,and cannot provide perfect forward secrecy.In this paper,we propose a secure and efficient handover authentication and key management protocol utilizing the Chinese remainder theory.The proposed scheme preserves the majority part of the original 5G system architecture defined by 3GPP,thus can be easily implemented in practice.Formal security analysis based on BAN-logic shows that the proposed scheme achieves secure mutual authentication and can remedy some security flaws in original 5G handover process.Performance analysis shows that the proposed protocol has lower communication overhead and computation overhead compared with other handover authentication schemes. 展开更多
关键词 5G wireless network handover authentication key management security
原文传递
Study on key management scheme for heterogeneous wireless sensor networks
2
作者 Qin Danyang Ma Jingya +3 位作者 Zhang Yan Yang Songxiang Ji Ping Feng Pan 《High Technology Letters》 EI CAS 2018年第4期343-350,共8页
Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it b... Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it becomes complex due to the mutual characteristics of sensor nodes in HWSN. In order to enhance the network security,an asymmetric key pre-distributed management scheme for HWSN is proposed combining with authentication process to further ensure the network security; meanwhile,an effective authentication method for newly added nodes is presented. Simulation result indicates that the proposed scheme can improve the network security while reducing the storage space requirement efficiently. 展开更多
关键词 HETEROGENEOUS WIRELESS sensor network(HWSN) key management authentication NETWORK security STORAGE space
下载PDF
UPT系统中的鉴权和密钥分发协议 被引量:2
3
作者 朱于军 林晓东 +1 位作者 廖建新 陈俊亮 《电子学报》 EI CAS CSCD 北大核心 1999年第7期51-54,共4页
本文分析了UPT系统中的鉴权和密钥协议需求.鉴于ETSI给出的可变鉴权码(VAC)协议仅适用于UPT用户在其归属区申请服务时的鉴权.提出了一种引入可信第三方的扩展VAC协议,并给出了协议各方之间鉴权数据的共享方案及一... 本文分析了UPT系统中的鉴权和密钥协议需求.鉴于ETSI给出的可变鉴权码(VAC)协议仅适用于UPT用户在其归属区申请服务时的鉴权.提出了一种引入可信第三方的扩展VAC协议,并给出了协议各方之间鉴权数据的共享方案及一种适用于UPT系统的密钥分发协议. 展开更多
关键词 安全 鉴权 密钥管理 通用个人通信
下载PDF
Sharing Smart Card Authenticated Sessions Using Proxies
4
作者 Kevin E. Foltz William R. Simpson 《Computer Technology and Application》 2016年第1期28-45,共18页
This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web... This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that requiresmart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart card. The approach uses proxies and card reader code to provide this capability to the requesting device.Previous work with remote or shared smart card use either requires continuous access to the smart card machine or specific client software. The approach in this paper works for any device and browser that has proxy settings, creates minimal network traffic and computation on the smart card machine, and allows the client to transfer from one network to another while maintaining connectivity to a server. This paper describes the smart card sharing approach, implementation and validation of the approach using real systems, and security implications for an enterprise using smart cards. 展开更多
关键词 Smart CARD IT security authentication key management PROXY SSL TLS session stealing
下载PDF
基于增强型智能网的接入控制及协议 被引量:1
5
作者 朱于军 王柏 +1 位作者 廖建新 陈俊亮 《电子学报》 EI CAS CSCD 北大核心 2000年第5期75-79,共5页
本文针对个人通信系统的需求 ,给出一种基于公钥体系的认证和密钥约定协议的实现方案 .在智能网体系结构中引入相应的接入控制实体 ,给出其实现结构、功能、协议和操作 ,描述了基于增强型智能网系统的安全接入 .
关键词 智能网 拉入控制 个人通信 通信协议
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部