提出一种高效的群组协商通信协议,针对节点身份认证的效率问题,采用群内节点自检认证的方式,避免向认证中心发送认证证书,从而提高身份认证的速度;针对通信的机密性和单点失败现象,采用节点协商建立群组的方法,进而实现节点间的可靠通信...提出一种高效的群组协商通信协议,针对节点身份认证的效率问题,采用群内节点自检认证的方式,避免向认证中心发送认证证书,从而提高身份认证的速度;针对通信的机密性和单点失败现象,采用节点协商建立群组的方法,进而实现节点间的可靠通信;针对合法车辆认证次数频繁问题,采用群密钥传输机制,减少合法车辆的认证次数,进而提高节点加入群组的速度。最后,安全性分析和性能分析结果表明,所提方案不但满足车载自组网(VANET,vehicle ad hoc network)通信的基本安全需求,并且在认证时延、传输开销和平均时延方面优于现有方案。展开更多
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ...Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.展开更多
文摘提出一种高效的群组协商通信协议,针对节点身份认证的效率问题,采用群内节点自检认证的方式,避免向认证中心发送认证证书,从而提高身份认证的速度;针对通信的机密性和单点失败现象,采用节点协商建立群组的方法,进而实现节点间的可靠通信;针对合法车辆认证次数频繁问题,采用群密钥传输机制,减少合法车辆的认证次数,进而提高节点加入群组的速度。最后,安全性分析和性能分析结果表明,所提方案不但满足车载自组网(VANET,vehicle ad hoc network)通信的基本安全需求,并且在认证时延、传输开销和平均时延方面优于现有方案。
基金The National Basic Research Program of China(973Program) (No.G1999035805)the Natural Science Foundation of ShannxiProvince (No.2007F37)China Postdoctoral Science Foundation (No.20060401008,20070410376).
文摘Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.