期刊文献+

支持移动网络的身份验证协议研究

Study of the Authentication Protocol for Mobile Network
下载PDF
导出
摘要 为了解决主机在移动过程中发生跨域时,移动网络应用层的安全性,结合移动网络的特点以及存在的安全威胁,对Kerberos域间身份验证协议进行改进,减少客户端参与的协议报文交互次数,使其适合为移动网络的应用服务提供身份验证服务,并采用形式化方法对改进的身份验证协议进行安全性验证。结果表明改进的安全协议能够提供与原有协议相同的安全性。 To address the security of the application layer in mobile network when mobile hosts move across the realm,considering the feature and existing security threats of the mobile network,we modify the Kerberos cross-realm authentication protocol by reducing the number of protocols messages that clients should take.The modified protocol can supply an authentication service to the applications in the mobile network.The formalism method is used to verify the security of the modified authentication protocol.From the result it can been seen the modified protocol can provide the same security as before.
出处 《南京邮电大学学报(自然科学版)》 2010年第6期18-24,共7页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家高技术研究发展计划(863计划)项目(2006AA01Z208) 江苏省科技支撑计划项目(BE200915) 南京邮电大学青蓝计划(NY208023)资助项目
关键词 移动网络 KERBEROS协议 域间身份验证 Mobile Network Kerberos Protocol Inter-Realm Authentication
  • 相关文献

参考文献10

  • 1姜楠,王健编著..移动网络安全技术与应用[M].北京:电子工业出版社,2004:349.
  • 2MUFTI M,KHANUM A.Design and implementation of secure Mobile IP protocol[C] ∥International Conference on Networking and Communication.New York:IEEE Communication Society,2004:53-57. 被引量:1
  • 3STEINER J G,NEUMAN B C,SCHILLER J I.Kerberos:An authentication Service for Open Network Systems[C] ∥Proc Winter USENIX Conference.New York:IEEE Communication Society,1988:191-202. 被引量:1
  • 4KOHL J,NEUMAN C.The Kerberos Network Authentication Service(V5)[S].Internet Engineering Task Force,RFC 1510,September 1993. 被引量:1
  • 5NEUMAN C,YU T,HARTMAN S,et al.The Kerberos Network Authentication Service(V5)[S].Internet Engineering Task Force,RFC 4120,July 2005. 被引量:1
  • 6KOHL JOHN T,CLIFFORD N B.The Evolution of the Kerberos Authentication Service[C] ∥Distributed Open Systems.Los Alamitos,CA:IEEE Computer Society Press,1994:78-94. 被引量:1
  • 7CERVESATO I,JAGGARD A D,SCEDROV A.Specifying Kerberos 5 cross-realm authentication[C] ∥Proceedings of the 2005 workshop on Issues in the theory of security.NY:ACM,2005:12-26. 被引量:1
  • 8KIM Hahnsang,SHIN K G,DABBOUS W.Improving Cross-domain Authentication over Wireless Local Area Networks[C] ∥Proceedingss of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks.New York:IEEE Communication Society,2005:80-92. 被引量:1
  • 9BOLDYREVA A,KUMAR V.Extended Abstract:Provable-Security Analysis of Authenticated Encryption in Kerberos[C] ∥IEEE Symmposium on Security and Privacy.New York:IEEE Communication Society,2007:92-100. 被引量:1
  • 10范红,冯登国编著..安全协议理论与方法[M].北京:科学出版社,2003:421.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部