期刊文献+

基于数字签名和SM2算法的终端接入认证协商协议 被引量:6

Terminal Access Authentication Negotiation Protocol Based on Digital Signature and SM2 Algorithm
下载PDF
导出
摘要 为保证智能终端和企业内网数据中心的双向通信安全,以数字签名和国密算法SM2为基础,提出一种终端接入认证协商协议。给出安全风险和效率分析,并利用BAN逻辑进行形式化分析。结果表明,该协议在终端和企业内网数据中心实现双方身份认证,协商出一个用于后续加密通信的共享密钥,具有较高的安全性。 In order to ensure the two-way communication security between the intelligent terminal and the enterprise intranet data center,a terminal access authentication negotiation protocol is proposed based on the digital signature and the national secret algorithm SM2.Security risk and efficiency analysis are given and BAN logic is used for formal analysis.The results show that the protocol implements two-party identity authentication in the terminal and enterprise intranet data center,and negotiates a shared key for subsequent encrypted communication,which has high security.
作者 吕良 李瑞 LV Liang;LI Rui(The Third Institute of the Ministry of Public Security,Shanghai 201204;North China Electric Power University,Beijing 102206)
出处 《计算机与数字工程》 2021年第3期530-535,共6页 Computer & Digital Engineering
关键词 SM2算法 数字签名 双向认证 密钥协商 BAN逻辑 SM2 algorithm digital signature two-way authentication key agreement BAN logic
  • 相关文献

参考文献5

二级参考文献35

  • 1李怀明.电子政务系统中基于组织的访问控制模型研究[D].大连:大连理工大学,2010. 被引量:1
  • 2Bruce N,Lee H J.A secure authentication protocol among mobile phone and wireless sensor networks[C]//Proc of the 15th International Conference on Advanced Communication Technology.[S.l.] :IEEE Press,2013:52-59. 被引量:1
  • 3Tyagi S,Kumar N.A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks[J].Journal of Network and Computer Applications,2013,36(2):623-645. 被引量:1
  • 4Turkanovic′ M,Brumen B,Hlbl M.A novel user authentication and key agreement scheme for heterogeneous Ad hoc wireless sensor networks,based on the Internet of things notion[J].Ad hoc Networks,2014,20:96-112. 被引量:1
  • 5Sun Dazhi,Li Jianxin,Feng Zhiyong,et al.On the security and improvement of a two-factor user authentication scheme in wireless sensor networks[J].Personal and Ubiquitous Computing,2013,17(5):895-905. 被引量:1
  • 6Yasmin R,Ritter E,Wang Guilin.Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks[J].International Journal of Information Security,2014,13(5):453-465. 被引量:1
  • 7Choi Y,Lee D,Kim J,et al.Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography[J].Sensors,2014,14(6):10081-10106. 被引量:1
  • 8Xiao Peng,He Jingsha,Fu Yingfang.An access authentication protocol for trusted handoff in wireless mesh networks[J].Computer Standards and Interfaces,2014,36(3):480-488. 被引量:1
  • 9Porambage P,Schmitt C,Kumar P,et al.PAuthKey:a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications[EB/OL].(2014).http://dx.doi.org/10.1155/2014/357430. 被引量:1
  • 10He Debiao,Zhang Yuanyuan,Chen Jianhua.Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks[J].Wireless Personal Communications,2014,74(2):229-243. 被引量:1

共引文献114

同被引文献44

引证文献6

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部