电子学报 ›› 2016, Vol. 44 ›› Issue (5): 1117-1123.DOI: 10.3969/j.issn.0372-2112.2016.05.015

• 学术论文 • 上一篇    下一篇

异构无线网络可控匿名漫游认证协议

周彦伟1,2,3, 杨波1,2,3, 张文政2   

  1. 1. 陕西师范大学计算机科学学院, 陕西西安 710062;
    2. 保密通信重点实验室, 四川成都 610041;
    3. 中国科学院信息工程研究所信息安全国家重点实验室, 北京 100093
  • 收稿日期:2014-09-23 修回日期:2014-11-23 出版日期:2016-05-25 发布日期:2016-05-25
  • 通讯作者: 杨波
  • 作者简介:周彦伟 男,1986年生于甘肃通渭.工程师,陕西师范大学计算机科学学院博士生.研究方向为无线通信技术、匿名通信技术、密码学.E-mail:zhouyanwei1986@163.com
  • 基金资助:

    国家自然科学基金(No.61572303,No.61272436,No.61402275,No.61303092);保密通信重点实验室基金(No.9140C110206140C11050);中国科学院信息工程研究所信息安全国家重点实验室开放课题(No.2015-MS-10);陕西省自然科学基金(No.2014JQ8309);中央高校基本科研业务费专项资金(No.GK201504016);陕西师范大学优秀博士论文项目(No.X2014YB01)

Controllable and Anonymous Roaming Protocol for Heterogeneous Wireless Network

ZHOU Yan-wei1,2,3, YANG Bo1,2,3, ZHANG Wen-zheng2   

  1. 1. School of Computer Science, Shaanxi Normal University, Xi'an, Shaanxi 710062, China;
    2. Science and Technology on Communication Security Laboratory, Chengdu, Sichuan 610041, China;
    3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Received:2014-09-23 Revised:2014-11-23 Online:2016-05-25 Published:2016-05-25

摘要:

分析传统的匿名漫游认证协议,指出其存在匿名不可控和通信时延较大的不足,针对上述问题,本文提出异构无线网络可控匿名漫游认证协议,远程网络认证服务器基于1轮消息交互即可完成对移动终端的身份合法性验证;并且当移动终端发生恶意操作时,家乡网络认证服务器可协助远程网络认证服务器撤销移动终端的身份匿名性.本文协议在实现匿名认证的同时,有效防止恶意行为的发生,且其通信时延较小.安全性证明表明本文协议在CK安全模型中是可证安全的.

关键词: 异构无线网络, 可控漫游, 匿名认证, CK安全模型

Abstract:

This paper analyzes the traditional anonymous roaming authentication protocol, and pointed out the deficiencies of their anonymity is not controlled and the communication is delay.The controllable anonymous roaming authentication protocol proposed in this paper for heterogeneous wireless networks, which can be completed to verify the legitimacy of the identity of the mobile terminal through a message interaction.If the mobile terminal has malicious operation, the home network authentication server can help remote network authentication server to revoke the identity anonymity of the mobile terminal.This is a protocol in anonymous authentication, at the same time, and which effectively preventing the occurrence of malicious behavior, and the communication delay.This protocol is safe in the CK security model.

Key words: heterogeneous wireless network, controlled roaming, anonymous authentication, CK security model

中图分类号: