期刊文献+

一种适用于无线Mesh网络的一次性口令认证协议 被引量:1

An OTP Authentication Protocol suitable for Wireless Mesh Networks
在线阅读 下载PDF
导出
摘要 无线Mesh网络是一种特殊的Adhoc网络,由于其共享无线传输媒介、动态拓扑的特点,容易遭受各种安全威胁。本文设计了一种适用于无线Mesh网络的一次性口令认证协议。该协议基于时间同步机制,采用HOTP-T算法,易于在令牌或IC卡等硬件上实现。分析表明:该协议能够有效抵御蛮力攻击、重放攻击,重同步机制容易实现,并且能够实现简单的双向认证,具有很高的安全性。 Wireless Mesh Network is a special kind of Ad hoc network. It is particularly vulnerable due to its features of shared wireless transmission medium and dynamic changing topology. An OTP authentication protocol suitable for wireless mesh networks is proposed based on time synchronization and HOTP–T algorithm. It can be easily implemented on token or IC card. The analysis demonstrates that such a protocol is highly secure to resist brute-force attack and replay attack effectively, realize resynchronization and simple dual authentication easily.
作者 张亮 刘建伟
出处 《微计算机信息》 2010年第27期40-42,共3页 Control & Automation
基金 基金申请人:刘建伟 项目名称:Ad hoc网络安全协议设计与仿真研究 基金颁发部门:国家"863"计划基金委(2009AA01Z418)
关键词 AD HOC网络 无线MESH网络 一次性口令 认证 Ad hoc network Wireless Mesh Network One Time Password Authentication
  • 相关文献

参考文献3

二级参考文献44

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2桂启山,王利长,余静.在PKI体系下进行电子政务信息的安全管理[J].微计算机信息,2006,22(07X):173-175. 被引量:9
  • 3P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.
  • 4Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273.
  • 5Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283.
  • 6Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158.
  • 7Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003.
  • 8Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005.
  • 9P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002.
  • 10Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96.

共引文献69

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部