• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

无线网络中身份认证协议选择方法

赵婧, 李鑫, 邓凌娟, 李兴华, 马建峰

赵婧, 李鑫, 邓凌娟, 李兴华, 马建峰. 无线网络中身份认证协议选择方法[J]. 计算机研究与发展, 2015, 52(3): 671-680. DOI: 10.7544/issn1000-1239.2015.20131376
引用本文: 赵婧, 李鑫, 邓凌娟, 李兴华, 马建峰. 无线网络中身份认证协议选择方法[J]. 计算机研究与发展, 2015, 52(3): 671-680. DOI: 10.7544/issn1000-1239.2015.20131376
Zhao Jing, Li Xin, Deng Lingjuan, Li Xinghua, Ma Jianfeng. A Selection Method for User Authentication Protocols in Wireless Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 671-680. DOI: 10.7544/issn1000-1239.2015.20131376
Citation: Zhao Jing, Li Xin, Deng Lingjuan, Li Xinghua, Ma Jianfeng. A Selection Method for User Authentication Protocols in Wireless Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 671-680. DOI: 10.7544/issn1000-1239.2015.20131376
赵婧, 李鑫, 邓凌娟, 李兴华, 马建峰. 无线网络中身份认证协议选择方法[J]. 计算机研究与发展, 2015, 52(3): 671-680. CSTR: 32373.14.issn1000-1239.2015.20131376
引用本文: 赵婧, 李鑫, 邓凌娟, 李兴华, 马建峰. 无线网络中身份认证协议选择方法[J]. 计算机研究与发展, 2015, 52(3): 671-680. CSTR: 32373.14.issn1000-1239.2015.20131376
Zhao Jing, Li Xin, Deng Lingjuan, Li Xinghua, Ma Jianfeng. A Selection Method for User Authentication Protocols in Wireless Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 671-680. CSTR: 32373.14.issn1000-1239.2015.20131376
Citation: Zhao Jing, Li Xin, Deng Lingjuan, Li Xinghua, Ma Jianfeng. A Selection Method for User Authentication Protocols in Wireless Networks[J]. Journal of Computer Research and Development, 2015, 52(3): 671-680. CSTR: 32373.14.issn1000-1239.2015.20131376

无线网络中身份认证协议选择方法

基金项目: 国家自然科学基金项目(U1135002,61372075,61202389,61372075,61303221);中央高校基本科研业务费专项资金项目(K5051303004);国家密码发展基金项目(MMJJ201201004);地理信息国家重点实验室开放课题(SKLGIE2013-M-4-1)
详细信息
  • 中图分类号: TP393

A Selection Method for User Authentication Protocols in Wireless Networks

  • 摘要: 无线网络中通常存在多种身份认证协议可供选择,如何选择一个能够满足用户个性化需求的协议是个尚未解决的问题.从用户的角度出发,针对无线网络的特点,在综合考虑了用户最为关心的几个要素,如协议的安全性、能量消耗、认证时间以及用户偏好的基础上,提出了解决方案.将能量消耗定义为用户发送、接收消息能量消耗以及交互过程中密码操作所涉及的能量消耗之和.其中,密码操作包括Hash算法、RSA密钥交换、数字签名以及对称加解密算法.实验部分对EAP-PEAP,EAP-TLS,EAP-TTLS-MD5和EAP-TTLS-MSCHAPV2这4种最为常用的协议进行比较,结果表明不管用户如何设置权值,EAP-TTLS/MSCHAPV2和EAP-TTLS/MD5总是优于EAP-PEAP,EAP-TLS. 该方案通过考虑用户对身份认证协议的安全性以及性能方面的要求,按照用户的个性化需求进行了协议方案的选择.
    Abstract: Generally, in wireless networks there are a certain number of candidate user authentication protocols which can be selected from, and how to select one that can fulfill the user’s personalized requirements is an unsolved problem. There already are some studies on the authentication protocols, but most of them are from the protocol designers’ perspective. To the best of our knowledge, this paper is the first to study how to select authentication protocols with considering the user’s personalized requirements in wireless networks. From the perspective of users, we propose a solution that guides users to select from different authentication protocols according to their personalized requirements, taking into users’ most concerning factors, e.g., security, energy consumption, authentication delay and their preference. The energy consumption is defined as the sum of the energy consumption of user transmitting, receiving messages and cryptographic operations involved in the process of interaction. The cryptographic operations include Hash algorithm, RSA key exchange, digital signature, symmetric encryption and decryption algorithm. Adopting our solution to the EAP protocols in WLAN, we evaluate the security and performance of the EAP-PEAP, EAP-TLS, EAP-TTLS/MD5 and EAP-TTLS/MSCHAPV2. The results show that, regardless of how users set the weight, EAP-TTLS/MSCHAPV2 and EAP-TTLS/MD5 are always better than EAP-PEAP and EAP-TLS.
  • 期刊类型引用(5)

    1. 郑磊,韩鹏军,田晨雨,张琦,钱隆. 基于威胁建模的网络安全日志自动化分析技术. 微型电脑应用. 2023(07): 154-156+180 . 百度学术
    2. 魏丽英,杨立华. 智能化无线通信信道安全容量控制仿真. 计算机仿真. 2022(09): 230-233+238 . 百度学术
    3. 钟煜明,陈长辉. 网络安全分析中的大数据综合研究. 现代信息科技. 2020(08): 142-144 . 百度学术
    4. 刘鸿楠. 网络交易安全与民商法保护的相关性窥探. 法制与社会. 2019(27): 11-12 . 百度学术
    5. 曾峰,崔宁. 无线传感器网络安全技术. 电子技术与软件工程. 2019(19): 195-196 . 百度学术

    其他类型引用(3)

计量
  • 文章访问数:  1785
  • HTML全文浏览量:  0
  • PDF下载量:  821
  • 被引次数: 8
出版历程
  • 发布日期:  2015-02-28

目录

    /

    返回文章
    返回