首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 10 毫秒
1.
王莺洁  罗为  沈昌祥 《通信技术》2008,41(5):118-120
文中针对组通信的特点,在深入研究已有组密钥管理认证算法优缺点的基础上,利用哈希函数、对称密码和捎带技术,给出了一种更为高效的组密钥认证方法,并从存储,计算和通信开销三方面与已有方法进行了详细比较.相比之下,采用该方法的优点是能够完全摆脱繁琐的基于公钥签名的认证计算,较适用于用户计算资源良莠不齐的大型动态组的密钥管理.  相似文献   

2.
针对车载自组织网络的特点,该文利用双线性对提出了一个新的基于身份的签密方案,并在随机预言模型中给出了安全性证明.在假设Bilinear Diffie-Hellman问题是困难的条件下,该方案被证明是安全的.与已有的基于身份的签密方案相比,该方案计算量和传输代价小,适合用于车载网安全通信.  相似文献   

3.
Through the explosive growth of network technologies, electronic commercial businesses have made our lives easier and more convenient. The application of e-coupons is quite a novel issue but is becoming increasingly popular among electronic commercial businesses because the extensive use of e-coupons can help consumers to save money; however, the e-coupon has also brought security issues as attackers can obtain illegitimate benefits from imperfections of the design. Hence, the security of the e-coupon system has become important as well. In this paper, we propose a novel and complete chaotic maps-based authentication scheme for e-coupon systems. Security analysis shows that our scheme satisfies essential security and functionality requirements. Furthermore, performance analysis shows that the execution time of our scheme is efficient and suitable for practical implementation in real life. In other words, users such as shops and customers can use our e-coupon system conveniently and securely.  相似文献   

4.
Wireless Personal Communications - For providing strong mutual authentication in a multi-server environment many algorithms have been proposed. Most of the algorithms provide mutual authentication...  相似文献   

5.
The goal of authentication scheme for Vehicular ad hoc networks (VANETs) is to ensure reliability and integrity of message.Due to the timeliness of traffic-related messages and the highly dynamic nature of VANETs,it still is a challenge to solve the three key issues simultaneously,i.e.security,efficiency and conditional privacy-preserving,on the design of authentication scheme for VANETs.To address this challenge,an efficient Conditional privacy-preserving authentication (CPPA) scheme is proposed in this paper.Compared with the most recent proposed CPPA schemes,our proposed scheme markedly decreases the computation costs of the message-signing phase and the message verification phase,while satisfies all security requirements of VANETs and provides conditional privacy-preserving.  相似文献   

6.
As the technology of mobile devices spreads fast, the price of mobile devices is getting cheaper. Most of the people have mobile devices, and these devices have the technology of near field communication (NFC). With the long time development and research, the mobile devices use NFC technology on the payment and authentication applications, and replace the smartcard, the access control card, and the credit card by using the card emulation mode. It helps the development of NFC applications. In recent years, more and more users begin using NFC technology on mobile payment and authentication. Many researches have proposed the related NFC authentication protocols, but their schemes are still lack of some security properties and functions, which are necessary for NFC authentication protocols. In this paper, we propose a secure and efficient NFC authentication scheme between two NFC devices by the help of the authentication server that provides mutual authentication.  相似文献   

7.
Handover authentication in high mobility scenarios is characterized by frequent and shortterm parallel execution. Moreover, the penetration loss and Doppler frequency shift caused by high speed also lead to the deterioration of network link quality. Therefore, high mobility scenarios require handover schemes with less handover overhead. However, some existing schemes that meet this requirement cannot provide strong security guarantees, while some schemes that can provide strong security guarante...  相似文献   

8.
The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the increasing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security as compared to GSM (2G) systems, UMTS still has some weaknesses that may often lead to several security incidents. In this article, we come up with a novel authentication mechanism based on the one-time-secret security capabilities, which can assure an expeditious mobile communication environment and simultaneously be able to deal with the several issues related to security vulnerabilities (Redirection Attack, Man-in-the-Middle-Attack) and others like the excessive bandwidth consumption, storage overhead in VLR etc. existing in the current mobile communication (UMTS). In addition, here we also introduce a new concept called “Neighborhood Policy”, where several VLRs can form groups among themselves and carry out significant responsibilities in order to authenticate a User without interfering HLRs even though the User moves to a new VLR (belongs to the same group). We argue that the proposed solution not only achieves the mutual authentication in a secure manner, but at the same time, it also greatly reduces the computation and communication cost of the mobile User as compared to the existing state of the art authentication schemes.  相似文献   

9.
基于一次签名的认证应用很广,通常的方法有在线,离线签名和前向安全的签名,但组播环境下的高效签名方案极为少见。这里提出了一种一次签名方案,它是一种对于签名生成和签名验证都极为高效的方案,而且签名长度很短。特别适用于组播通信的数据源认证。  相似文献   

10.
With the exponential growth of intelligent Internet of Things(IoT) applications, Cloud-Edge(CE) paradigm is emerging as a solution that facilitates resource-efficient and timely services. However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel. Additionally, with the presence of resource-constrained devices, it’s imperative to conduct the secure communication mechanism, while still guaranteeing efficiency. Physical unclonab...  相似文献   

11.
An Efficient Message Authentication Scheme for Vehicular Communications   总被引:1,自引:0,他引:1  
In this paper, we introduce a novel roadside unit (RSU)-aided message authentication scheme named RAISE, which makes RSUs responsible for verifying the authenticity of messages sent from vehicles and for notifying the results back to vehicles. In addition, RAISE adopts the $k$- anonymity property for preserving user privacy, where a message cannot be associated with a common vehicle. In the case of the absence of an RSU, we further propose a supplementary scheme, where vehicles would cooperatively work to probabilistically verify only a small percentage of these message signatures based on their own computing capacity. Extensive simulations are conducted to validate the proposed scheme. It is demonstrated that RAISE yields a much better performance than previously reported counterparts in terms of message loss ratio (LR) and delay.   相似文献   

12.

Authentication schemes are widely used mechanisms to thwart unauthorized access of resources over insecure networks. Several smart card based password authentication schemes have been proposed in the literature. In this paper, we demonstrate the security limitations of a recently proposed password based authentication scheme, and show that their scheme is still vulnerable to forgery and offline password guessing attacks and it is also unable to provide user anonymity, forward secrecy and mutual authentication. With the intention of fixing the weaknesses of that scheme, we present a secure authentication scheme. We show that the proposed scheme is invulnerable to various attacks together with attacks observed in the analyzed scheme through both rigorous formal and informal security analysis. Furthermore, the security analysis using the widely-accepted Real-Or-Random (ROR) model ensures that the proposed scheme provides the session key (SK) security. Finally, we carry out the performance evaluation of the proposed scheme and other related schemes, and the result favors that the proposed scheme provides better trade-off among security and performance as compared to other existing related schemes.

  相似文献   

13.
提出了一支持信息的私有性和通信方的认证性的基于用户标识符(ID)的安全的认证和密钥分配方案.当安全网络系统建立后,不需要可信第三方参与认证过程,通信双方执行协议后,仅用两个信息就获得双方相互认证和产生共享密钥.  相似文献   

14.
一种适用于移动环境的认证和支付协议   总被引:4,自引:0,他引:4  
基于非平衡单向二进制树(UOBT)的微支付模型,设计了一个适用于移动用户向收费信息网络付费的微支付夫议。该协议可以实现通信各方的相互认证,能保证用户不被错误收费,同时提供收费信息网络防止用户抵赖的合法证据。  相似文献   

15.
Wireless Personal Communications - The inter-vehicular communications need to be secure as well as anonymous as the security and privacy’s effective operations are demanding in order to...  相似文献   

16.
富磊  陈添丁 《无线电工程》2003,33(11):17-20
在无线移动网络环境中,服务器端对其所属客户端的用户进行密钥管理与身份重新确认等处理程序,同时藉由时间点分群验证的方式来减轻服务器端在计算上的负荷量。此外,当进行资料交换的端点发生严重错误而被迫中断联机或需重新激活时,系统将会通过本身的稽核资料对先前已验证的密钥与用户资料进行复原动作,因此可在资源有限的系统当中,避免重复运算的情况发生,同时考虑在不过度增加既有传输成本等前提下,提出安全的密钥管理与回复验证等机制,进而确保复原程序后的密钥与用户资料本身的正确性与完整性。  相似文献   

17.
车联网作为提高交通效率和安全最有前途的技术之一,已经引起了工业界和学术界的广泛关注.其中,V2X安全通信是研究热点之一.然而,V2X技术的发展也引发了许多安全和隐私问题.为了解决这些问题,大量面向V2X通信的认证协议被提出.本文首先详细介绍了V2X通信的标准模型以及车联网的特点,并根据其特点分析了认证协议设计中需要满足...  相似文献   

18.
Edge computing is a highly virtualized paradigm that can services the Internet of Things(Io T)devices more efficiently. It is a non-trivial extension of cloud computing, which can not only meet the big data processing requirements of cloud computing, but also collect and analyze distributed data. However, it inherits many security and privacy challenges of cloud computing, such as: authentication and access control.To address these problem, we proposed a new efficient privacy-preserving aggregat...  相似文献   

19.
Wireless Personal Communications - In the recent paper, Nai-Wei Lo and Jia-Lun Tsai mathematically proposed an efficient authentication scheme for vehicular sensor network. It uses elliptic curve...  相似文献   

20.
组播通信正成为不断增长的应用基础,而其关键是要为组通信提供可靠的安全机制,然而,现有的组播安全协议仅能提供部分的解决方法,考虑到源认证是组的最主要安全事务之一,文章基于消息认证码提出了一种安全有效的组播源认证方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号