信息网络安全 ›› 2015, Vol. 15 ›› Issue (3): 54-58.doi: 10.3969/j.issn.1671-1122.2015.03.011

• • 上一篇    下一篇

无线网络中可证安全的移动用户密钥交换协议

王沂(), 韩广国, 李慧智   

  1. 杭州电子科技大学理学院,浙江杭州310018
  • 收稿日期:2015-02-09 出版日期:2015-03-10 发布日期:2015-05-08
  • 作者简介:

    作者简介: 王沂(1991-),女,陕西,硕士研究生,主要研究方向:代数及其应用;韩广国(1972-),男,山东,副教授,博士,主要研究方向:群与组合结构、代数几何码和密码学;李慧智(1990-),女,湖南,硕士研究生,主要研究方向:代数及其应用。

  • 基金资助:
    国家自然科学基金[11471123];浙江省自然科学基金[LY12A01004]

Provable Security Mobile User Key Exchange Protocol for Wireless Communications

Yi WANG(), Guang-guo HAN, Hui-zhi LI   

  1. College of Science, Hangzhou Dianzi University, Hangzhou Zhejiang 310018, China
  • Received:2015-02-09 Online:2015-03-10 Published:2015-05-08

摘要:

无线网络中的无缝漫游对于用户来说是非常需要的,而在漫游中风险无处不在,因此对移动用户的安全认证是迫切且具有挑战性的。近年来,各种基于身份验证的密钥交换协议越来越受到专家学者们的重视,在管理密码文件中出于防篡改和便捷性的需要,一些基于安全认证的智能卡方案被相继提出。文章提出了注册在不同代理上的两个用户基于智能卡的身份验证方案,该方案需要在两个用户和两个代理之间进行5次信息交换。文章对方案进行了安全性分析,证明该方案可以抵制多种攻击,如重放攻击、已知密钥攻击、内部攻击、离线口令猜测攻击、模仿攻击、恶意代理攻击等。文章实现了处于漫游的用户与注册在外部代理的用户的对话,实用性更强、轮数较少,表明该方案简单、安全、高效。

关键词: 防篡改, 便捷性, 身份验证方案, 外部代理

Abstract:

Seamless roaming in wireless network is very needed for users, and roaming in risk everywhere. Counterfeit mobile user identity for server access, for example, or for mobile users access to the server for a variety of malicious attacks resulting in the process of seamless roaming security threatened, therefore the safety of the mobile user authentication is urgent and challenging. Recently, all kinds of key exchange protocol based on authentication, more and more get the attention of the experts and scholars in the administrative password file because the tamper-proof function and convenience needs some smart card scheme based on safety certification were successively put forward, including Daojing He Team in key exchange protocol based on authentication between the wireless network users registered with the server security efficient implementation of authentication and communication has made a great contribution. The main content of the article is put forward on the registered agent in different two user authentication scheme based on smart card. Need between two users and two agents for five times the exchange of information, and to plan to do the safety analysis proves that the scheme can resist various attacks, such as replay attacks, known key attack, inside attack, offline password guessing attacks, imitate attack, a malicious attack agent etc. Article implements in roaming users and registered in an external agent dialogue, practical stronger, round number is less, so the scheme is more simple, safe and efficient.

Key words: tamper-resistance, convenience, authentication scheme, foreign agent

中图分类号: