检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张媛 高飞 何春燕 ZHANG Yuan;GAO Fei;HE Chun-yan(College of Mobile Telecommunications,Chongqing University of Posts and Telecom,Chongqing 401520,China;Taishan Institute of Technology,Shandong University of Science and Technology,Shandong Taian 271038,China)
机构地区:[1]重庆邮电大学移通学院,重庆合川401520 [2]山东科技大学泰山科技学院,山东泰安271038
出 处:《计算机仿真》2021年第5期189-192,306,共5页Computer Simulation
基 金:重庆市教委科技研究项目(KJQN201802404);重庆市教育科学“十三五”规划课题(2019-GX-474)。
摘 要:为了解决异构网络通信跨域口令认证效率低、安全性差的问题,提出了改进传统C2C-PAKE认证协议安全性能,改善切换切入阶段时延的跨域口令认证方式优化方法。改近传统C2C-PAKE认证协议,建立分立式子层,形成多层扩展子层认证系统,引入私钥机制及随机序列数解密用户信息,生成跨域通信用户特有的认证口令,用自身私钥加密语义信息和认证协议,重复用户验证步骤,排除其它恶意攻击者,提高认证安全指数;在预切换和接入认证传输安全口令阶段,应用增加算法得到口令认证域间信任列表,提高认证效率,建立异构网络跨域通信实验环境,仿真对比结果表明,在安全性能和认证效率两方面,所提方法遭遇的认证威胁与认证开销均优于其它方法,具有广阔的应用空间。In order to solve the problem of low efficiency and poor security of cross domain password authentication in heterogeneous network communication, this paper proposes an optimization method of cross domain password authentication, which improves the security performance of traditional c2 c-pake authentication protocol and the delay of handoff cut in phase.The discrete sublayer was established to form a multilayer extended sublayer authentication system. Private key mechanism and random sequence number were introduced to decrypt the user information to generate the unique authentication password of cross domain communication users. The private key was adopted to encrypt semantic information and authentication protocol. The user authentication steps were repeated to exclude other malicious attackers, improving the authentication security index. During the period of pre-handover and access authentication, the algorithm was applied to obtain the inter domain trust list of password authentication, improving the authentication efficiency and establishing the cross-domain communication experimental environment of heterogeneous networks. The results show that the security performance and authentication efficiency of the proposed method are superior to those of the traditional methods, and it has a promising application prospect.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.142.144.163