期刊文献+

基于HMAC的认证与密钥协商协议 被引量:2

A HMAC-based Authentication and Key Agreement Protocol
下载PDF
导出
摘要 针对Wang方案的安全漏洞,论文提出一个基于HMAC的认证与密钥协商协议。该协议仅使用HMAC函数,降低了对物联网体系结构中终端设备的运算和存储能力的要求。安全性与性能分析结果表明,该协议可有效抵抗假冒攻击、重传攻击等常见攻击,并完成双方认证与信息安全地传输。 Aiming at the securing hole of Wang's scheme,a HMAC-based authentication and key agreement protocol is proposed in this paper.The HMAC function is merely utilized in the proposed protocol,and the demand for the capacity of calculation and storage of terminal device of IOT are reduced.The analysis of security and performance shows that this protocol can effectively resist spoofing attack,retransmission attack and so on,which can complete the authentication and information transmission safely.
作者 马巧梅
出处 《计算机与数字工程》 2013年第5期792-793,800,共3页 Computer & Digital Engineering
基金 宝鸡文理学院重点项目(编号:ZK11177)资助
关键词 物联网 信息安全 认证 HASH IOT information security authentication Hash
  • 相关文献

参考文献11

  • 1杨波.现代密码学[M].北京:清华大学出版社,2007. 被引量:27
  • 2BehrouzAForouzan.密码学与网络安全[M].北京:清华大学出版社,2009:425-450. 被引量:8
  • 3邱卫东等编著..密码协议基础[M].北京:高等教育出版社,2009:254.
  • 4L. Lamport. Password authentication with insecure communication[J]. Communication of the ACM 24(11), 1981 :770 -772. 被引量:1
  • 5J. Hwang, T. Yeh. Improvement on Peyravian Zunic's password authentication schemes[J]. IEICE Transactions on Communications, 2002, E85-B(4) : 823-825. 被引量:1
  • 6L. Chun, T. Hwan. A password authentication scheme with secure password updating[J]. Computers & Security,2003,22 (1):68-72. 被引量:1
  • 7M. Peyravian, C. Jeffries. Secure remote user access over insecure networks [J]. Computer Communications, 2006,29 (5/6):660-667. 被引量:1
  • 8B. Wang, H. Zhang, Z. Wang, et al. A secure mutual pass -word authentication scheme with user anonymity[J]. Geometrics and Information Science of Wuhan University, 2008, 33 (10), 2008 : 1073-1075. 被引量:1
  • 9Juels. A. RFID Security and Privacy.. A Research Survey[R]. The IEEE Journal on the Selected Areas in Communications, 2006,24(2) :381- 394. 被引量:1
  • 10李莉,薛锐,张焕国,冯登国,王丽娜.基于口令认证的密钥交换协议的安全性分析[J].电子学报,2005,33(1):166-170. 被引量:15

二级参考文献29

  • 1Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang. Three-party encrypted key exchange: attacks and a solution [J]. ACM Operating Systems Review, 2000,34(4):12 - 20. 被引量:1
  • 2Chun-Li Lin, Hung-Min Sun, Michael Steiner and Tzonelih Hwang.Thrree-party eacrypted key exchange without server public-keys[J]. IEEE Communications Letters,2001,5(12) :497- 499. 被引量:1
  • 3D P Jablon. Strong password-only authenticated key exchange [J].SIGCOMM Computer Communication Review, 1996,26(5) :5 - 26. 被引量:1
  • 4S Lucks. Open key exchange: how to defeat dictionary attacks without encrypting public keys[A]. Proceedings of the Workshop on Security Protocols[C]. Ecole Normale Superieure, 1997. 被引量:1
  • 5T Wu. A real world analysis of Kerberos password security [A]. In NDSS'99. 被引量:1
  • 6S Halevi, H Krawczyk. Public-key cryptography and password protocols[A]. ACM Transaction on Information and System Security [C]. New York, USA,ACM Press, 1999,2(3) :230 - 268. 被引量:1
  • 7M Bellare, D Pointcheval, P Rogaway. Authenticated key exchange secure against Dictionary Attacks [A]. Advances in Cryptology-Eurocrypt' 00 [C]. LNCS 1807, B Preneel ed., Springer-Verlag,2000. 被引量:1
  • 8V Boyko, P Mackenzie and S Patel. Provably secure password authenticated key exchange using diflie hellmau [A]. Proceedings of Advances in Cryptology-Ettrocrypt 2000 [ C ]. LNCS 1807, 2000. 156- 171. 被引量:1
  • 9G Lowe. Analysing protocols subject to guessing attacks[A]. Workshop on Issues in the Theory of Security(WTIS'02) [C] .January 2002. 被引量:1
  • 10F J Thayer Fabrega, J C Herzog, J D Guttman. Strand space: why is a security protocol correct[A]. IEEE Computer Symposium on Security and Privacy[C]. 1998. 被引量:1

共引文献48

同被引文献27

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部