共查询到20条相似文献,搜索用时 56 毫秒
1.
对称加解密是保障传输数据安全的重要机制。对称加密技术具有高速、计算复杂度低的优点,但是安全性低于非对称加密机制。因此,在现代的数据安全传输过程中,一般使用非对称加解密与对称加解密相结合的来实现效率与安全性的均衡。但是,同时使用两种加密机制会带来密钥生成、分发与管理方面的问题。对此,文章提出一种基于SRv6协议实现的对称密钥生成和分发机制,该机制利用SRv6的路由机制来实现消息路由节点共同协商生成密钥,由此可以实现一次性对称加密密钥协商生成、分发与身份认证功能。相对于现有的机制,文章所提方案在安全性、便捷性方面具有突出优点。 相似文献
2.
3.
4.
身份认证技术是能够对信息收发方进行真实身份鉴别的技术,是保护网络信息资源安全的第一道大门。如何确定用户身份以控制用户对信息资源的访问,是一个值得研究的问题。本文对目前常用的身份认证技术的发展现状和技术特点进行了综述,分析了目前网络环境下常用的身份认证技术。 相似文献
5.
对基于哈希函数的RFID身份认证协议进行了简要的介绍,对多个协议的安全性能进行了详细的分析和比较,指出其存在的安全缺陷,并提出相应的改进思路。 相似文献
6.
密钥协商协议应该在满足安全性的条件下,使实现协议所需的计算开销尽可能小。文中提出了一个基于身份的认证密钥协商协议BAKAP(ID-Based Authenticated Key Agreement Protocol)。该协议提供了已知密钥安全性、完善前向保密性、密钥泄露安全性、未知密钥共享安全性和密钥控制安全性。在该协议中,参与者只需执行两次椭圆曲线点乘法和一次双线性运算。该协议与已有协议相比,计算代价小。 相似文献
7.
8.
9.
10.
魏宗秀 《信息安全与通信保密》2008,(11)
随着信息技术的迅速发展,因特网进入社会生活的各个领域,在网络环境下信息安全的问题日益突出。文章介绍了基于X.509证书的身份认证协议方案,分别阐述了单向身份认证、双向身份认证和三向身份认证,对其安全性做了分析,并对其广泛应用做了一点启示。 相似文献
11.
Anwar Ghani Khwaja Mansoor Shahid Mehmood Shehzad Ashraf Chaudhry Arif Ur Rahman Malik Najmus Saqib 《International Journal of Communication Systems》2019,32(16)
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource‐limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key‐based authentication protocol for IoT‐based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol. 相似文献
12.
As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform. 相似文献
13.
14.
15.
16.
In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving. 相似文献
17.
18.
物联网中RFID技术的应用非常广泛,但是RFID系统的安全性却存在着很大隐患。在RFID系统中标签与读写器间的通信信道是最易受到攻击,传输数据的完整性与保密性得不到保障,因而需要加强RFID系统通信的安全机制。考虑到RFID系统的硬件条件与成本限制,需要建立一个适合RFID系统的安全认证协议,来解决在RFID系统中信息传输所遇到的安全问题。PRESENT算法是轻量级的分组加密算法,将PRESENT结合到RFID系统的安全认证协议中,形成了新的RFID安全认证协议PRSA(PRESENT based RFID security authentication)。此协议可以增强RFID系统的安全性而又不会占用过多的硬件资源,从而能够适用于低成本的RFID系统的通信安全。 相似文献
19.
Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA. 相似文献