期刊文献+

基于标识的无线Mesh网络接入认证协议 被引量:5

Identity-based access authentication protocol for wireless mesh network
在线阅读 下载PDF
导出
摘要 为解决无线Mesh网络节点高效、安全入网认证的问题,提出了一种新的基于标识认证的无线Mesh网络接入认证协议。该协议针对无线Mesh网络的特点,将标识认证体制引入到无线Mesh节点接入认证当中,并在标识认证的基础上一次性完成了入网节点的双向身份认证、网络认证和空口密钥的建立3个步骤。简化了认证的流程,减少了认证的时延,达到了分布式认证的效果,为大规模的节点接入提供了一种新的认证方案。通过BAN逻辑形式化方法证明了协议的安全性,通过效率分析说明了协议的高效性。 To deal with efficiently and safely access for wireless mesh network (WMN), a new wireless mesh network access au- thentication protocol using identity-based cryptography is proposed. By taking WMN factors such as no-center, adaptive, multi hop into consideration, identity based authentication mechanism is introduced into WMN access authentication, based on which two way Identity confirmation, network authentication and key agreement between accessing-node and accessed node are finished. According to the protocol, the process of authentication is simplified, and the delay of authentication is also reduced, meanwhile, distributed authentication is realized, last and most important, a new authentication method is provided to mass node access. In the end, security is proved by the method of BAN logic formal verification, and the effidency is shown by efficiency analysis.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第4期1300-1304,共5页 Computer Engineering and Design
关键词 无线MESH网络 接入认证协议 标识 BAN逻辑 形式化证明 wireless mesh network access authentication protocol identity BAN logic formal verification
作者简介 张钧媛(1988-),女(土家族),湖南张家界人,硕士研究生,研究方向为无线网络安全 鄢楚平(1965-),男,湖北洪湖人正研究员,研究方向为通信与移动计算技术 王朝翔(1977-),男,福建龙岩人,博士,工程师,研究方向为移动计算技术。E-mail:bitzjy@163.com
  • 相关文献

参考文献2

二级参考文献19

  • 1王江平,李治柱.移动通信网中的双向认证与密钥协商新协议[J].信息安全与通信保密,2004,26(8):34-36. 被引量:2
  • 2李兴华,马建峰,文相在.基于身份密码系统下Canetti-Krawczyk模型的安全扩展[J].中国科学(E辑),2004,34(10):1185-1192. 被引量:6
  • 3Zhou Y,Cao Z,Chai Z.Identity based key insulated signature[C]//LNCS3903:Proceedings of ISPEC'06.[S.1.]:Springer-Verlag,2006:226-234.
  • 4Li J,Zhang F,Wang Y.A strong identity based key-insulated cryptosystem[C]//LNCS 4097:Proceedings of Advances in IFIP'2006.[S.1.]:Springer-Verlag,2006:353-362.
  • 5Salem N B,Hubaux J P.Seeuring wireless Mesh networB[J].IEEE Wireless Communications Special Issue of Wireless Mesh Networking,2006(4):50-55.
  • 6IEEE P802.11s/D1.0 IEEE Draft Amendment to Standard for Information Technology-Telecommunications and Information Exchange between Systems-LAN/MAN Specific Requirements-Part 11:Wireless Medium Access Control(MAC)and Physical Layer (PHY)Specifications:Amendment:ESS Mesh Networking[S].2006.
  • 7裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:95
  • 8杨超,曹春杰,马建峰.通用可组合安全的Mesh网络认证协议[J].西安电子科技大学学报,2007,34(5):814-817. 被引量:10
  • 9ZHANG Mu-xiang,FANG Yu-guang.Security analysis and enhancements of 3GPP authentication and key agreement protocol[J].IEEE Trans on Wireless Communications,2005,4(2):734-742.
  • 10LEE H K,MOON S J.AKA protocols for mobile communications[C]// Proc of the 5th Australasian Conference Information Security and Privacy.London:Springer-Verlag,2000:400-411.

共引文献10

同被引文献42

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部