浏览全部资源
扫码关注微信
1. 福建师范大学数学与计算机科学学院,福建 福州 350007
2. 福建省网络安全与密码技术重点实验室,福建 福州 350007
3. 三明学院现代教育技术中心,福建 三明 365004
[ "苏彬庭(1990-),男,福建泉州人,福建师范大学硕士生,主要研究方向为网络与信息安全。" ]
[ "许力(1970-),男,福建福州人,博士,福建师范大学教授,主要研究方向为无线网络与移动通信、网络与信息安全、物联网与云计算、智能信息处理、复杂网络和网络的建模与仿真。" ]
[ "王峰(1978-),男,山东泗水人,福建师范大学博士生、副教授,主要研究方向为网络与信息安全。" ]
[ "林志兴(1973-),男,福建三明人,三明学院高级实验师,主要研究方向为计算机网络及应用。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
苏彬庭, 许力, 王峰, 等. 基于群签名的无线Mesh网络匿名切换认证方案[J]. 通信学报, 2016,37(Z1):174-179.
Bin-ting SU, Li XU, Feng WANG, et al. Anonymity handover authentication protocol based on group signature for wireless Mesh network[J]. Journal on communications, 2016, 37(Z1): 174-179.
苏彬庭, 许力, 王峰, 等. 基于群签名的无线Mesh网络匿名切换认证方案[J]. 通信学报, 2016,37(Z1):174-179. DOI: 10.11959/j.issn.1000-436x.2016264.
Bin-ting SU, Li XU, Feng WANG, et al. Anonymity handover authentication protocol based on group signature for wireless Mesh network[J]. Journal on communications, 2016, 37(Z1): 174-179. DOI: 10.11959/j.issn.1000-436x.2016264.
为保证Mesh网络移动客户端视频、语音等实时性强的业务不中断,一种快速安全的切换认证策略显得非常重要。从保护移动节点的隐私信息出发,提出了一种基于群签名的无线Mesh网络匿名切换认证方案。与其他基于群签名的切换认证方案不同,该方案中切换认证过程不涉及群签名相关运算,且群签名运算只在路由器上进行。该方案不仅满足了安全性要求,还具有较高的认证效率和保护用户隐私的优点。
In order to ensure that the Mesh network mobile client video
voice and other real-time strong applications without interruption
a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes
an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature
the proposed scheme did not involve the group signature correlation operation
and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.
RAFFAELE R , MARCO C , ENRICO G . Mesh networks:commodity multihop ad hoc networks [J ] . IEEE Communications Magazine , 2005 , 43 ( 3 ): 123 - 131 .
PHILIP W . Mesh networks:a new architecture for broadband wireless access systems[C]//IEEE Conference on Radio and Wireless (RAW-CON) . 2000 : 43 - 46 .
HE D J , CHEN C , CHAN S , et al . Secure and efficient handover authentication based on bilinear pairing functions [J ] . IEEE Transac-tions on Wireless Communications , 2012 , 11 ( 1 ): 48 - 53 .
POLITIS C , CHEW K A , AKHTAR N , et al . Hybrid multilayer mobil-ity management with AAA context transfer capabilities for all-IP net-works [J ] . IEEE Wireless Communications , 2004 , 11 ( 4 ): 76 - 88 .
CHOI J D , JUNG S W . A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6 [J ] . IEICE Transactions on Communications , 2008 ,E-91B( 2 ): 605 - 608 .
HE D J , BU J J , CHAN S , et al . Privacy-preserving universal authen-tication protocol for wireless communications . IEEE Transactions on Wireless Communication , 2011 , 10 ( 2 ): 431 - 436 .
LIAO Y P , WANG S . A secure dynamic ID based remote user authen-tication scheme for multi-server environment [J ] . Computer Standards& Interfaces , 2009 , 31 ( 1 ): 24 - 29 .
YEH K H , LO N W . A novel remote user authentication scheme for multi-server environment without using smart cards [J ] . International Journal of Innovative Computing,Information & Control , 2010 , 6 ( 8 ): 3467 - 3478 .
LAI C Z , LI H , LIANG X H , et al . CPAL:a conditional pri-vacy-preserving authentication with access linkability for roaming service [J ] . Internet of Things Journal,IEEE , 2014 , 1 ( 1 ): 46 - 57 .
CHANG C C , LEE C Y , CHIU Y C . Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J ] . Computer Communications , 2009 , 32 ( 4 ): 611 - 618 .
HSIANG H C , SHIH W K , Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environ-ment [J ] . Computer Standards & Interfaces , 2009 , 31 ( 6 ): 1118 - 1123 .
HE D J , MA M D , ZHANG Y , et al , A strong user authentication scheme with smart cards for wireless communications [J ] . Computer Communications , 2011 , 34 ( 3 ): 367 - 374 .
YANG X , HUANG X Y , HAN J G , et al . Improved handover authentica-tion and key pre-distribution for wireless mesh networks [J ] . Concurrency and Computation:Practice and Experience , 2016 , 28 ( 10 ): 2978 - 2990 .
HAN Q , ZHANG Y , CHEN X , et al . Efficient and robust iden-tity-based handoff authentication in wireless networks [J ] . Network and System Security . Springer Berlin Heidelberg , 2012 : 180 - 191 .
SHEN A N , GUO S , ZENG D , et al . A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communica-tions[C]//Wireless Communications and Networking Conference (WCNC) , 2012 : 2543 - 2548 .
XU L , HE Y , CHEN X F , et al . Ticket-based handoff authentication for wireless mesh networks [J ] . Computer Networks . 2014 , 73 : 185 - 194 .
ZHANG X , LI G , HAN W . Ticket-based authentication for fast hand-over in wireless mesh networks [J ] . Wireless Personal Communications , 2015 , 85 ( 3 ): 1509 - 1523 .
苏彬庭 , 许力 , 方禾 , 等 . 基于Diffie-Hellman的无线Mesh网络快速认证机制研究 [J ] . 山东大学学报 , 2016 , 51 ( 9 ): 6 - 11 .
SU B T , XU L , FANG H , et al . Fast authentication mechanism based on Diffie-Hellman for wireless Mesh networks [J ] . Journal of Shan-dong University , 2016 , 51 ( 9 ): 6 - 11 .
LI G S , JIANG Q , WEI F S , et al . A new privacy-aware handover authentication scheme for wireless networks [J ] . Wireless Personal Communications , 2015 , 80 ( 2 ): 581 - 589 .
CHAUDHRY S A , FARASH M S , NAQVI H , et al . A robust and efficient privacy aware handover authentication scheme for wireless networks [J ] . Wireless Personal Communications , 2015 , 1 - 25 .
ZHANG Z Z , QI Q Q , KUMAR N , et al . A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography [J ] . Multimedia Tools and Applications , 2015 , 74 ( 10 ): 3477 - 3488 .
CAMENISCH J , STADLER M . Efficient group signature schemes for large groups[C]//Annual International Cryptology Conference . Springer Berlin Heidelberg , 1997 : 410 - 424 .
HE D B , KHAN M K , KUMAR N . A new handover authentication protocol based on bilinear pairing functions for wireless networks [J ] . International Journal of Ad Hoc and Ubiquitous Computing , 2015 , 18 ( 1/2 ): 67 - 74 .
HE D B , CHEN J H , HU J . An id-based proxy signature schemes without bilinear pairings [J ] . Annals of Telecommunication , 2011 , 66 ( 11 - 12 ): 657 - 662 .
0
浏览量
619
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构