通信学报 ›› 2016, Vol. 37 ›› Issue (Z1): 174-179.doi: 10.11959/j.issn.1000-436x.2016264

• 学术论文 • 上一篇    下一篇

基于群签名的无线Mesh网络匿名切换认证方案

苏彬庭1,2,许力1,2,王峰1,2,林志兴1,2,3   

  1. 1 福建师范大学数学与计算机科学学院,福建 福州 350007
    2 福建省网络安全与密码技术重点实验室,福建 福州 350007
    3 三明学院现代教育技术中心,福建 三明 365004
  • 出版日期:2016-10-25 发布日期:2017-01-17
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;福建省高校产学研合作重大基金资助项目;福建师范大学科研创新团队基金资助项目;福州市科技局基金资助项目

Anonymity handover authentication protocol based on group signature for wireless Mesh network

Bin-ting SU1,2,Li XU1,2,Feng WANG1,2,NZhi-xing LI1,2,3   

  1. 1 School of Information,Central University of Finance and Economics,Beijing 100081,China
    2 School of Management Engineering,Henan Institute of Engineering,Zhengzhou 451191,China
    3 Modern Education Technology Center,Sanming University,Sanming 365004,China
  • Online:2016-10-25 Published:2017-01-17
  • Supported by:
    TheNationalNaturalScienceFoundationofChina;TheNationalNaturalScienceFoundationofChina;Major Science and Technol-ogy Project in Fujian Province;Fujian Normal University Innovative Research Team Project;Foundation of Fuzhou Municipal Science and Technology Bureau

摘要:

为保证Mesh网络移动客户端视频、语音等实时性强的业务不中断,一种快速安全的切换认证策略显得非常重要。从保护移动节点的隐私信息出发,提出了一种基于群签名的无线Mesh网络匿名切换认证方案。与其他基于群签名的切换认证方案不同,该方案中切换认证过程不涉及群签名相关运算,且群签名运算只在路由器上进行。该方案不仅满足了安全性要求,还具有较高的认证效率和保护用户隐私的优点。

关键词: Mesh网络, 切换认证, 认证效率, 隐私保护

Abstract:

In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.

Key words: Mesh network, handover authentication, authentication efficiency, privacy-preserving

No Suggested Reading articles found!