期刊文献+

基于IBE的无线网络身份认证模型研究 被引量:1

Research of Wireless Network Identity Authentication Model Based on IBE
下载PDF
导出
摘要 传统的基于PKI无线网络身份认证方案效率较低、适用性较差。基于IBE的身份认证方案无需通过颁发数字证书来绑定用户身份和公钥,可以提高认证效率。针对IBE的这个特点,就IBE在无线网络身份认证中的应用问题开展研究,在此基础上设计了基于IBE的无线网络认证模型和相关协议,并分析协议的效率和安全性。 Traditional wireless network identity authentication scheme based on PKI which is low efficiency and bad compatibility.The IBE-based identity authentication scheme,which is without the need for issuing digital certificates to bind user identity and public key,can improve the certification efficiency.Firstly this paper researchs the application about IBE identity authentication in wireless networks,On this basis,IBE-based authentication model and related protocols are designed.Finally,the efficiency and security of protocols are analysed.
出处 《计算机与数字工程》 2010年第8期165-167,181,共4页 Computer & Digital Engineering
关键词 无线网络 公钥密码 身份认证 认证模型 安全协议 wireless network public key cryptography identity authentica-tion authentication model security protocol
  • 相关文献

参考文献8

二级参考文献39

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:103
  • 3林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 4Hankerson Darrel, Menezes Alfred J, Vanstone Scott. Guide to Elliptic Curve Cryptography. Berlin: Springer-verlag Publishers, 2004. 被引量:1
  • 5Enge Andreas. Elliptic Curves and Their Applications to Cryptography. Holland: Kluwer Academic Publishers, 1999. 被引量:1
  • 6William Stallings. Cryptography and Network Security Principles and Practices. 4th edition. USA: Prentice Hall, 2005. 被引量:1
  • 7Paterson K G. ID-based signatures from pairings on elliptic curves. Electronics Letters, 2002, 38(18): 1025-1026. 被引量:1
  • 8Accredited Standards Committee X9. Public key cryptography for the financial services industry. The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standard xg. 62-2005. November 16, 2005. 被引量:1
  • 9Lowe G. An attack on the needham-schroeder public key authentication protocol. Information Processing Letters, 1995, 56(3) : 131-136. 被引量:1
  • 10Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols//Proceedings of the 1st Conference on Computer and Communications Security. Fairfax, Virginia, United States, 1993:62-73. 被引量:1

共引文献30

同被引文献10

  • 1周贤伟,刘宁,覃伯平.IEEE 802.1x协议的认证机制及其改进[J].计算机应用,2006,26(12):2894-2896. 被引量:18
  • 2N. B. Salem and J-P Hubaux. Securing Wireless MeshNetwork[J]. IEEE. Wireless Communication, 2006,13(2) : 51-55. 被引量:1
  • 3Dae-Hee Seo, Im-Yeong Lee. Single Sign-on AuthenticationModel Using MAS (Multi agent System) [J].Communications, Computers and Signal Processing,2003(2):692-695. 被引量:1
  • 4Caimu T, Oliver W. Mobile privacy in wireless networkrevisited [J]. IEEE Transactions on WirelessCommunication,2008,7(3) : 1035-1041. 被引量:1
  • 5H. Xie,J. Zhao. A lightweight identity authenticationmethod by exploiting network covert channel [J]. Networkingand Applications,2014,8(6) : 1-10. 被引量:1
  • 6L. Xiao, L. Greenstein and N. Mandayam, et al. Usingthe physical layer for wireless authentication in time-variantchannels [J]. IEEE Trans. Wireless Communication,2008,7(7) :2571-2579. 被引量:1
  • 7C. Wang, Z. Huang, E. Peng. On the unified authenticationtechnology of network token[J]. Energy Procedia,2012,17:1476-1481. 被引量:1
  • 8T. Miyake, S. Suzuki, et al. Efficiency of authenticationnetwork construction on organization LA N [J].Leice technical report office information systems,2009,108:19-24. 被引量:1
  • 9Boneh D, Franklin M. Identity-Based encryption fromthe Weil pairing[C]//Lecture Notes in Computer Science2139. Berlin:Springer-Verlag,2001 :213-229. 被引量:1
  • 10李金库,张德运,张勇.身份认证机制研究及其安全性分析[J].计算机应用研究,2001,18(2):126-128. 被引量:37

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部