期刊文献+

支持身份隐藏的EAP-PSK协议改进 被引量:1

Improvement of EAP-PSK Protocol Enabling Identity Privacy
下载PDF
导出
摘要 鉴于身份隐藏这一安全新需求,在分析EAP-PSK协议的基础上,剖析EAP-SIM和EAP-TTLS认证身份保密的特点,提出一种支持身份隐藏机制的EAP-PSK改进方案,并在复杂性上与EAP-TTLS进行了比较.结果表明,新协议具有安全、简单、可行、与原协议兼容的优点,有一定的实用价值. Identity privacy is becoming a new security requirement of the wireless network. Recently some authentication protocols have supported this security mechanism such as EAP-SIM and EAP-TTLS. It is a pity that both of them are unsatisfactory in some aspects of solving the identity privacy. This paper describes an approach for modifying the EAP-PSK protocol to support the identity privacy mechanism. We compare the complexity of the new EAP-PSK protocol with the EAP-TTLS protocol. The result shows the new EAP-PSK protocol has the superiority in security, simplicity, feasibility and compatibility, which improve the value of practicality.
作者 吉晓东
出处 《南通大学学报(自然科学版)》 CAS 2007年第2期74-77,共4页 Journal of Nantong University(Natural Science Edition) 
关键词 EAP—PSK协议 认证 身份隐藏 EAP-PSK protocol authentication identity privacy
  • 相关文献

参考文献6

  • 1[1]Judy H M.Protocol failures in cryptosystems[J].Proceedings of the IEEE,1988,76((5):594-595. 被引量:1
  • 2[2]Didier S,Refik M.A method providing identity privacy to mobile users during authentication[C]//Proceedings of the Workshop on Mobile Computing Systems and Applications,California:IEEE,1994:196-198. 被引量:1
  • 3[3]Florent B.The EAP-PSK protocol:a pre-shared key EAP method[EB/OL].(2005-09-09)[2006-06-09].http://ieffreport.isoc.org/all-ids/draft-bersani-eap-psk-09.txt. 被引量:1
  • 4[4]Tonesi D,Salgarelli L Smart PSK provising:a key-management and suthentication dcheme for wireless LANs[C]//IEEE 14th International Conference on Computer Communications and Networks,Califomia:IEEE,2005:119-124. 被引量:1
  • 5[5]Haverinen H,Salowey J.Extensible authentication protocol method for GSM subscriber identity modules (EAP-SIM)[EB/OL].(2004-11-24)[2006-06-11].http://www.potaroo.net/ietf/all-ids/draft-haverinen-pppext-eap-sim-15.txt. 被引量:1
  • 6[6]Funk P,Blake-Wilson S.EAP tunneled Tls authentication protocol version O[EB/OL].(2001-02-01)[2006-06-15].http://www.watersprings.org/pub/id/draft-funk-eap-tfls-vO-00.txt. 被引量:1

同被引文献14

  • 1赵志新,祝跃飞,梁立明.无线局域网隧道认证协议PEAP的分析与改进[J].信息工程大学学报,2005,6(3):52-55. 被引量:3
  • 2DARIO D C, ANTONIO S, GEORG T. SWIM- a next generation ATM information bus-the SWIM-SUIT prototype[A]. 2010 14th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW)[C]. 2010.41- 46. 被引量:1
  • 3BOB S. Security architecture for system wide information manage- merit[A]. The 24th 2005 Digital Avionics Systems Conference (DASC 2005)[C]. 2005. 被引量:1
  • 4BOB S. System-wide information management (SWIM) demonstra- tion security architecture[A]. 2006 IEEE/AIAA 25th Digital Avionics Systems Conference[C]. 2006. 1-12. 被引量:1
  • 5Federal Aviation Administration. System Wide Information Manage- ment (SWIM) eXtensible Markup Language (XML) Gateway Re- quirements[S]. 2009. 被引量:1
  • 6International Civil Aviation Organization. Web service security stan- dards[A]. Aeronautical Telecommunication Network Implementation Coordination Group-Eighth Working Group Meeting[C]. Christchurch New Zealand, 2010. 被引量:1
  • 7IETF RFC3588. Diameter Base Protocol[S]. 2003. 被引量:1
  • 8IETF RFC3748. Extensible Authentication Protocol(EAP)[S]. 2004. 被引量:1
  • 9IETF RFC 4072, Diameter Extensible Authentication Protocol(EAP) AtDlicationr[S]. 2005. 被引量:1
  • 10吕小平,齐鸣.浅谈SWIM[J].民航管理,2009(5):68-69. 被引量:2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部