首页 | 本学科首页   官方微博 | 高级检索  
     检索      

异构无线网络可控匿名漫游认证协议
引用本文:周彦伟,杨波,张文政.异构无线网络可控匿名漫游认证协议[J].电子学报,2016,44(5):1117-1123.
作者姓名:周彦伟  杨波  张文政
作者单位:1. 陕西师范大学计算机科学学院, 陕西西安 710062; 2. 保密通信重点实验室, 四川成都 610041; 3. 中国科学院信息工程研究所信息安全国家重点实验室, 北京 100093
基金项目:国家自然科学基金(No.61572303,No.61272436, No.61402275,No.61303092);保密通信重点实验室基金(No.9140C110206140C11050);中国科学院信息工程研究所信息安全国家重点实验室开放课题(No.2015-MS-10);陕西省自然科学基金(No.2014JQ8309);中央高校基本科研业务费专项资金(No.GK201504016);陕西师范大学优秀博士论文项目(X2014YB01)
摘    要:分析传统的匿名漫游认证协议,指出其存在匿名不可控和通信时延较大的不足,针对上述问题,本文提出异构无线网络可控匿名漫游认证协议,远程网络认证服务器基于1轮消息交互即可完成对移动终端的身份合法性验证;并且当移动终端发生恶意操作时,家乡网络认证服务器可协助远程网络认证服务器撤销移动终端的身份匿名性.本文协议在实现匿名认证的同时,有效防止恶意行为的发生,且其通信时延较小.安全性证明表明本文协议在CK安全模型中是可证安全的.

关 键 词:异构无线网络  可控漫游  匿名认证  CK安全模型  
收稿时间:2014-09-23

Controllable and Anonymous Roaming Protocol for Heterogeneous Wireless Network
ZHOU Yan-wei,YANG Bo,ZHANG Wen-zheng.Controllable and Anonymous Roaming Protocol for Heterogeneous Wireless Network[J].Acta Electronica Sinica,2016,44(5):1117-1123.
Authors:ZHOU Yan-wei  YANG Bo  ZHANG Wen-zheng
Institution:1. School of Computer Science, Shaanxi Normal University, Xi'an, Shaanxi 710062, China; 2. Science and Technology on Communication Security Laboratory, Chengdu, Sichuan 610041, China; 3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
Abstract:This paper analyzes the traditional anonymous roaming authentication protocol,and pointed out the defi-ciencies of their anonymity is not controlled and the communication is delay.The controllable anonymous roaming authenti-cation protocol proposed in this paper for heterogeneous wireless networks,which can be completed to verify the legitimacy of the identity of the mobile terminal through a message interaction.If the mobile terminal has malicious operation,the home network authentication server can help remote network authentication server to revoke the identity anonymity of the mobile terminal.This is a protocol in anonymous authentication,at the same time,and which effectively preventing the occurrence of malicious behavior,and the communication delay.This protocol is safe in the CK security model.
Keywords:heterogeneous wireless network  controlled roaming  anonymous authentication  CK security model
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号