共查询到20条相似文献,搜索用时 171 毫秒
1.
本文阐述北美蜂窝电话业暂行标准IS 41修订本C中采纳的鉴权、话音保密和信令信息加密而产生的信息流。鉴权和产生话音保密伪装码及信令信息加密密钥等所采用的算法基于使用密钥 (也称作共享秘密数据或SSD)进行鉴权的专用密钥密码技术。该标准有两种提案。通过采用简单的用户移动模型对这两种方案进行比较 ,并研究了它们对网络数据库业务量的影响。 相似文献
2.
CDMA中的鉴权和加密 总被引:2,自引:0,他引:2
王晗阳 《信息安全与通信保密》2002,(2):43-46
鉴权和加密是移动通信系统必须要面对的问题。随着诸如电子商务等新业务的应用,这些问题 变得越来越重要。本文重点介绍了CDMA中的鉴权:包括CAVE鉴权算法,密钥体系以及鉴权流程,同时对CDMA 中的通信安全性问题也做了阐述。最后本文指出了在第三代移动通信中鉴权和加密的发展趋势。 相似文献
3.
《无线电通信技术》2016,(5):60-63
研究了长期演进(Long Term Evolution,LTE)系统的认证和密钥协商(EPS-AKA)过程,分析了鉴权过程中存在的安全缺陷,如归属用户服务器(Home Subscriber Server,HSS)鉴权用户设备(User Equipment,UE)时,HSS产生的用于产生其他密钥的随机数RAND,在发给UE的时候是未加密的。同时,许多参数的产生通过调用函数,输入值为一个密钥,会很容易被破解。通过分析,提出了一种改进方案,该方案解决了鉴权过程中RAND暴露的问题,并在生成其他参数时采用了密钥对机制,增加了所产生参数的安全级别,使LTE系统更加安全。 相似文献
4.
本文介绍了TETRA数字集群通信系统的鉴权、空中接口加密、端到端加密等多种安全技术,简要给出了TETRA系统中的密钥分配方式,最后给出了三种可能的TETRA系统的安全技术的发展或应用. 相似文献
5.
6.
无线视频监控系统的安全不能单纯依靠加密来保证,从信息系统安全体系的角度,对无线视频监控系统的安全进行了分析,并对系统中主要应用的鉴权、密钥管理、空中接口加密、端到端加密等安全机制进行了重点研究。 相似文献
7.
TETRA系统安全技术的研究 总被引:1,自引:0,他引:1
本介绍了TETRA数字集群通信系统的鉴权、空中接口加密、端到端加密等多种安全技术,简要给出了TETRA系统中的密钥分配方式,最后给出了三种可能的TETRA系统的安全技术的发展或应用。 相似文献
8.
3G接入技术中认证鉴权的安全性研究 总被引:5,自引:0,他引:5
对3G用户接入时的认证鉴权进行分析和研究,介绍了3G的安全体系结构,详细分析了3G的认证和鉴权机制和过程、用户信息的加密和完整性保护的过程和方法、密钥协商机制,并指出了3G认证鉴权机制可能存在的缺陷,最后对2G和3G的互通方面的安全性和2G与3G安全上下文之间转换运算的算法进行了分类和剖析。 相似文献
9.
10.
用户识别模块(SIM)内部存储着与用户有关的个人信息和网络信息,包括鉴权和加密信息Ki(密钥Ke算法输入参数之一,密钥号)、国际移动用户识别码(IMSI);A3:IMSI认证算法;A5:加密密钥生成算法;A8:密钥生成算法;呼叫限制信息和缩位拨号信息。此外,为了支持网络的操作与运行,SIM卡还应存 相似文献
11.
12.
安全管理和计费管理对于以太网无源光网络(EPON)进入电信级运营,推动EPON的大规模商用有着重要意义.认证是实现安全管理和计费管理的关键技术.文章结合IEEE802.1x标准和RADIUS协议,提出了EPON系统认证机制的一种设计,通过net-snmp软件包在Linux系统上开发代理,实现了远程认证拨号用户服务(RADIUS)客户端功能. 相似文献
13.
14.
15.
A self-encryption mechanism for authentication of roaming and teleconference services 总被引:2,自引:0,他引:2
A simple authentication technique for use in the global mobility network (GLOMONET) is proposed. This technique is based on the concept of distributed security management, i.e., the original security manager administrates the original authentication key (long-term secret key) acquired when a user makes a contract with his home network, while a temporary security manager is generated for a roaming user in the visited network that provides roaming services. The temporary security manager will take the place of the original security manager when the roaming user stays in the service area of the visited network. In the proposed authentication protocol for the regular communication phase, the procedures of the original security manager and the temporary security manager are the same except for introducing different parameters. Furthermore, the proposed technique not only reduces the number of transmissions during the authentication phase, but it also can decrease the complexity of mobile equipment. The idea behind the proposed technique is to introduce a simple mechanism which is called "self-encryption". We also suggest that this mechanism can be easily adopted as the authentication function for the secure teleconference service. 相似文献
16.
Authentication is the first step toward establishing a service provider and customer association. In a mobile network environment, a lightweight and secure authentication protocol is one of the most significant factors to enhance the degree of service persistence. This work presents a secure and lightweight keying and authentication protocol suite termed time‐assisted authentication protocol (TAP). The TAP improves the security of protocols with the assistance of time‐based encryption keys and scales down the authentication complexity by issuing a reauthentication ticket. While moving across the network, a mobile customer node sends a reauthentication ticket to establish new sessions with service‐providing nodes. Consequently, this reduces the communication and computational complexity of the authentication process. In the keying protocol suite, a key distributor controls the key generation arguments and time factors, while other participants independently generate a keychain based on key generation arguments. We undertake a rigorous security analysis and prove the security strength of TAP using communicating sequential processes and rank function analysis. 相似文献
17.
As the extension of service provider network,the home network is the last section of the service delivery process, so it must have the characteristics of the operator network, that is, stable performance, manageable, maintainable, quality of service, security, and extendable.In this paper, with the integration of the new access network technology Ethemet passive optical network (EPON) and the remote network management protocol, TR-069 protocol, addressed by the Digital Subscriber Line (DSL)Forum, a remote management fiamework of home network based on EPON is presented.Then, a prototype system is also provided to realize the functions of TR-069 protocol on residential gateway. 相似文献
18.
该文在深入研究无线网络802.11i鲁棒安全通信的基础上,提出基于量子隐形传态的无线网络鲁棒安全通信协议,利用量子纠缠对的非定域关联性保证数据链路层的安全。首先,对量子隐形传态理论进行描述,并着重分析临时密钥完整性协议和计数器模式及密码块链消息认证协议的成对密钥、组密钥的层次结构;其次,给出了嵌入量子隐形传态的成对密钥、组密钥的层次结构方案;最后,在理论上给出安全证明。该协议不需要变动用户、接入点、认证服务器等基础网络设备,只需增加产生和处理纠缠对的设备,即可进行量子化的密钥认证工作,网络整体框架变动较小。 相似文献
19.
Guoliang Liu Huichuan Zhang Fanyue Kong Lei Zhang 《Wireless Personal Communications》2018,101(3):1445-1455
The existing RFID (Radio Frequency Identification) security protocol lacks the key establishment mechanism, assuming only that both parties of the authentication protocol have shared their respective session keys. However, key establishment is an integral part of the RFID security system. This article first introduces the elliptic curve related mathematical theory foundation. Then we establish the key negotiation mechanism, and analyze the correctness and rationality of the negotiation mechanism. Finally, we design the authentication protocol based on elliptic curve in mobile RFID system, analyze the protocol authentication process, and compare the security and performance with other protocols, which shows that the authentication protocol has more efficient performance and the ability to resist all kinds of attacks. 相似文献
20.
泛在网络是标准的异质异构网络,保证用户在网络间的切换安全是当前泛在网的一个研究热点。该文对适用于异构网络间切换的认证协议EAP-AKA进行分析,指出该协议有着高认证时延,且面临着用户身份泄露、中间人攻击、DoS攻击等安全威胁,此外接入网络接入点的有效性在EAP-AKA协议中也没有得到验证,使得用户终端即使经过了复杂的认证过程也不能避免多种攻击。针对以上安全漏洞,该文提出一种改进的安全认证协议,将传统EAP-AKA的适用性从3G系统扩展到泛在网络中。新协议对传播时延和效率进行完善,为用户和接入点的身份信息提供有效性保护,避免主会话密钥泄露,采用椭圆曲线Diffie Hellman算法生成对称密钥,在每次认证会话时生成随机的共享密钥,并实现用户终端与家乡域网络的相互认证。通过开展实验,对协议进行比较分析,验证了新协议的有效性及高效率。 相似文献