首页 | 本学科首页   官方微博 | 高级检索  
     

移动网络可信匿名认证协议
引用本文:张鑫,杨晓元,朱率率.移动网络可信匿名认证协议[J].计算机应用,2016,36(8):2231-2235.
作者姓名:张鑫  杨晓元  朱率率
作者单位:1. 武警工程大学 电子技术系, 西安 710086;2. 武警工程大学 信息安全研究所, 西安 710086
基金项目:国家自然科学基金资助项目(61402530);武警工程大学基础研究基金资助项目(WJY201520)。
摘    要:针对终端接入移动网络缺乏可信性验证问题,提出一种移动网络可信匿名认证协议,移动终端在接入网络时进行身份验证和平台完整性认证。在可信网络连接架构下,给出了可信漫游认证和可信切换认证的具体步骤,在认证时利用移动终端中预存的假名和对应公私钥对实现了用户匿名隐私的保护。安全性分析表明,协议满足双向认证、强用户匿名性、不可追踪性和有条件隐私保护。协议中首次漫游认证需要2轮交互,切换认证需1轮即可完成,消息交换轮数和终端计算代价优于同类可信认证协议。

关 键 词:可信计算  可信网络连接  移动网络  漫游认证  可信认证  
收稿时间:2016-01-27
修稿时间:2016-03-17

Trusted and anonymous authentication protocol for mobile networks
ZHANG Xin,YANG Xiaoyuan,ZHU Shuaishuai.Trusted and anonymous authentication protocol for mobile networks[J].journal of Computer Applications,2016,36(8):2231-2235.
Authors:ZHANG Xin  YANG Xiaoyuan  ZHU Shuaishuai
Affiliation:1. Department of Electronic Technology, Engineering University of Armed Police Force, Xi'an Shaanxi 710086, China;2. Institute of Information Security, Engineering University of Armed Police Force, Xi'an Shaanxi 710086, China
Abstract:The lackness of trusted verification of mobile terminal may affect the security of mobile network. A trusted anonymous authentication protocol for mobile networks was proposed, in which both user identity and platform integrity were authenticated when the mobile terminal accesses the networks. On the basis of trusted network connection architecture, the concrete steps of trusted roaming authentication and trusted handover authentication were described in detail. The authentication used pseudonyms and the corresponding public/private keys to achieve the protection of the user anonymous privacy. The security analysis indicates that the proposed protocol meets mutual authentication, strong user anonymity, untraceability and conditional privacy preservation; moreover, the implementation of the first roaming authentication requires two rounds of communications while the handover authentication protocol just needs one round. The analytic comparisons show that the proposed protocol is efficient in terminal computation and turns of message exchange.
Keywords:trusted computing                                                                                                                        trusted network connection                                                                                                                        mobile network                                                                                                                        roaming authentication                                                                                                                        trusted authentication
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号