[1]王海清,苏伟,董平. 基于三元对等鉴别的一体化网络接入机制研究[J].计算机技术与发展,2016,26(04):96-100.
 WANG Hai-qing,SU Wei,DONG Ping. Research on Identity Authentication Scheme in Universal Network Based on Tri-element Peer Authentication Method[J].,2016,26(04):96-100.
点击复制

 基于三元对等鉴别的一体化网络接入机制研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年04期
页码:
96-100
栏目:
安全与防范
出版日期:
2016-04-10

文章信息/Info

Title:
 Research on Identity Authentication Scheme in Universal Network Based on Tri-element Peer Authentication Method
文章编号:
1673-629X(2016)04-0096-05
作者:
 王海清苏伟董平
 北京交通大学 电子信息工程学院
Author(s):
 WANG Hai-qingSU WeiDONG Ping
关键词:
 三元对等鉴别一体化网络双向身份鉴别RSA
Keywords:
 tri-element peer authenticationuniversal networktwo-way authenticationRSA
分类号:
TP31
文献标志码:
A
摘要:
 网络安全接入机制在一体化网络完善过程中具有举足轻重的地位,目前通用的二元鉴别机制缺乏对执行端的验证,在某种程度上影响了网络安全性。为了保证网络安全,实现终端安全可信地接入核心网络,文中提出了一种基于三元对等鉴别的一体化网络安全接入机制。该鉴别认证机制能实现接入终端与接入交换路由器的双向身份鉴别,可以有效防止非授权终端接入网络,同时防止恶意接入交换路由器对终端的欺骗,即实现了终端、交换路由器和认证中心三个认证实体间的相互鉴别认证,并从性能和安全性等方面分析了此机制的优越性。文中提出的方法增强了一体化网络中对终端接入访问的安全控制,推动了三元对等鉴别技术的应用,促进了一体化网络的完善。
Abstract:
 Identity authentication scheme in universal network is extremely important. General two-element peer authenticate has short-comings that it doesn’ t authenticate the router,which is a potential security problem. In order to guarantee the network security and realize terminal access to core network safely and credibly,a kind of integrated network security access mechanism based on tri-element peer au-thentication is put forward. In the new mechanism,terminal and router can authenticate each other by this way and effectively prevent un-authorized terminal access to networks,at the same time prevention of malicious access to exchange router for cheating terminal,which implements mutual identification authentication for terminal,exchange routers and certification center. The superiority of this mechanism is analyzed from performance and security and other aspects. The proposed method enhances the network security control of terminal ac-cess,promoting the application for ternary peer identification technology,raising the improvement of the integration of network.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(04):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(04):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(04):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(04):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(04):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(04):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(04):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(04):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(04):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(04):47.

更新日期/Last Update: 2016-06-16