信息网络安全 ›› 2016, Vol. 16 ›› Issue (8): 32-38.doi: 10.3969/j.issn.1671-1122.2016.08.006

• • 上一篇    下一篇

基于CPK的无线Mesh网络节点双向认证方案研究

李东臻1, 严承华2, 罗旬3()   

  1. 1. 海军装备部,湖北武汉 430000
    2. 海军工程大学,湖北武汉 430000
    3. 92325部队,山西大同 037000
  • 收稿日期:2016-06-25 出版日期:2016-08-20 发布日期:2020-05-13
  • 作者简介:

    作者简介: 李东臻(1986—),女,湖北,工程师,硕士,主要研究方向为网络安全;严承华(1967—),男,湖北,副教授,博士,主要研究方向为网络安全、数字图像处理、水印处理、视觉密码认证等;罗旬(1986—),男,山西,助理工程师,硕士,主要研究方向为网络安全、认证技术等。

  • 基金资助:
    湖北省自然科学基金[2015CFA066]

Research on Two-way Authentication Scheme for Wireless Mesh Network Based on CPK

Dongzhen LI1, Chenghua YAN2, Xun LUO3()   

  1. 1. Naval Armaments Department, Wuhan Hubei 430000, China
    2. Naval University of Engineering, Wuhan Hubei 430000, China
    3.Unit 92325, PLA, Datong Shanxi 037000, China
  • Received:2016-06-25 Online:2016-08-20 Published:2020-05-13

摘要:

无线Mesh网络是一种新型的无线网络,它是WLAN和移动自组网的结合,同时兼有二者的优点,因而具有很大的发展潜力。然而安全问题一直是制约其发展的根本性问题,节点认证是保证无线Mesh网络安全的第一道屏障。文章通过对比分析IBC认证和CPK认证的优缺点,得出CPK组合公钥具有密钥空间巨大、密钥管理简单、安全性和保密性高等特点,特别适合大规模的网络节点接入。为解决无线Mesh网络节点安全、高效入网认证的问题,文章提出了基于CPK的无线Mesh网络节点双向认证方案,该方案针对Mesh网络特点,将CPK组合公钥技术引入到无线Mesh网络节点认证当中,在此基础上结合公钥密码体制和设置挑战随机数、时间戳等,实现了入网节点的双向身份认证,简化了认证的流程,减少了认证的时延,为大规模的节点接入提供了一种新的认证方案。最后通过安全分析和仿真验证,证明了该方案的安全性和有效性。

关键词: 网络安全, Mesh网络, 认证技术, CPK

Abstract:

Mesh network is a new type of wireless network, which combined by WLAN and Ad-hoc, and it has great potentialities. But the security problems restrict the development of Mesh. This paper analyses the advantages and disadvantages of CPK and IBC, and finds that CPK is suitable to access for large-node. In order to solve the problem of authentication for wireless mesh network, this paper carried out a new protocol to deal with efficiently and safely access of Mesh, by taking CPK into Mesh access authentication. And the two-way authentication was achieved, by using CPK algorithm, public key system, random numbers and time stamp. According to the protocol, the process of authentication is simplified, and the delay is also reduced, meanwhile a new authentication method is provided to mass node access. In the end, security analysis and simulation proved the effectiveness and security of this method.

Key words: network security, Mesh network, authentication technology, CPK

中图分类号: