首页 | 本学科首页   官方微博 | 高级检索  
     

无线网络下可信移动节点接入认证方案
引用本文:孙丽娜,常桂然,王兴伟.无线网络下可信移动节点接入认证方案[J].计算机应用,2011,31(11):2950-2953.
作者姓名:孙丽娜  常桂然  王兴伟
作者单位:1. 东北大学 信息科学与工程学院,沈阳 1108192. 东北大学 计算中心,沈阳 110819
基金项目:国家自然科学基金,高等学校博士学科点专项科研基金
摘    要:将基于属性且无可信第三方的平台验证协议以及基于身份的加密协议应用到无线网络环境下节点接入认证模型中,提出一个无线网络环境下的可信移动节点接入认证方案。与现有的认证方案相比,基于可信平台的移动节点接入认证方案主要有以下特点:1)在验证移动节点用户身份的同时也验证了移动节点的平台身份;2)不仅提供了移动节点和网络代理间的双向认证,还提供了移动节点间的双向认证。分析表明,改进后的方案满足接入节点身份的匿名性。

关 键 词:无线网络    可信移动节点    可信计算    身份认证    匿名性
收稿时间:2011-05-18
修稿时间:2011-07-08

Authentication scheme for trusted mobile nodes in wireless network
SUN Li-na,CHANG Gui-ran,WANG Xing-wei.Authentication scheme for trusted mobile nodes in wireless network[J].journal of Computer Applications,2011,31(11):2950-2953.
Authors:SUN Li-na  CHANG Gui-ran  WANG Xing-wei
Affiliation:1. School of Information Science and Engineering, Northeastern University, Shenyang Liaoning 110819, China2. Computing Center,Northeastern University, Shenyang Liaoning 110819, China
Abstract:The platform authentication protocol based on the property without the third party and the encryption protocol based on identity were applied to the node authentication scheme under the wireless networks. Compared with the existing methods, the proposed trusted mobile node access scheme has two major features: 1) both the mobile platform identity and the mobile user identity are verified at the same time; 2) the mutual attestation not only between the mobile user and the network Agent, but also between the mobile users are provided. Analysis shows that the improved scheme can meet the anonymous requirement.
Keywords:wireless network                                                                                                                          trusted mobile node                                                                                                                          trusted computing                                                                                                                          identity authentication                                                                                                                          anonymity
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号