信息网络安全 ›› 2018, Vol. 18 ›› Issue (1): 73-79.doi: 10.3969/j.issn.1671-1122.2018.01.011

• • 上一篇    下一篇

普适计算中匿名跨域认证协议的分析与改进

屈娟1(), 李艳平2, 李丽1   

  1. 1.重庆三峡学院数学与统计学院,重庆404000
    2. 陕西师范大学数学与信息科学学院,陕西西安710062
  • 收稿日期:2017-09-10 出版日期:2018-01-20 发布日期:2020-05-11
  • 作者简介:

    作者简介:屈娟(1984—),女,陕西,副教授,硕士,主要研究方向为无线网络安全;李艳平(1978—),女,山西,副教授,博士,主要研究方向为密码学与信息安全;李丽(1981—),女,湖南,讲师,硕士,主要研究方向为数值计算。

  • 基金资助:
    国家自然科学基金[61402275];重庆市教委科学技术研究基金[KJ1501019]

Cryptanalysis and Security Enhancement of an Efficient Secure Authentication Scheme with User Anonymity for Roaming User in Ubiquitous Networks

Juan QU1(), Yanping LI2, Li LI1   

  1. 1. School of Mathematics and Statistics, Chongqing Three Gorges University, Chongqing 404000, China
    2.College of Mathematics and Information Science, Shaanxi Normal University, Xi’an Shaanxi 710062, China;
  • Received:2017-09-10 Online:2018-01-20 Published:2020-05-11

摘要:

文章分析了一个普适计算中的匿名跨域认证协议的安全缺陷,指出该方案易遭受假冒攻击、内部攻击、会话密钥泄漏攻击,无法实现前向安全性及不正确的口令更新。提出了一个改进方案实现普适计算中的匿名跨域认证。与原方案相比,改进方案的先进性主要体现在两方面:克服了原协议的安全缺陷;改进方案的计算量很小,更适于普适计算中应用。

关键词: 普适网络, 用户匿名性, 认证, 会话密钥

Abstract:

In this paper, we review an efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks by Shin et al.. We show that this scheme is vulnerable to forgery attack, insider attack, session key disclosure attack. Moreover, this paper points out that Shin scheme cannot preserve forward secrecy and the password change phase is not correct. Then, we give an enhanced authentication scheme with user anonymity. The authentication scheme improves the original one in two aspects : firstly, the scheme can overcome the weaknesses in Shin' s scheme. Secondly, the scheme has lower computational costs and is more suitable for applications in ubiquitous networks.

Key words: ubiquitous networks, user anonymity, authentication, session key

中图分类号: