资源受限环境安全身份认证方案研究
[Abstract]:As an important mechanism to guarantee the information security, the identity authentication technology can effectively identify the real identity of the communication participants, and is an important means to realize the confidentiality and integrity of the information system. However, in different application environments, the communication entities involved in the identity authentication process are different, and the authentication relationship between the entities is not the same, and ultimately results in different security and efficiency requirements. As a typical application scenario of the identity authentication scheme, the resource-limited environment is a natural constraint with limited resources or capacity limitation in the entity participating in the communication, and the contradiction between the security requirements and the execution efficiency of the identity authentication scheme is particularly prominent. The research work of this paper is carried out around the resource limited environment security identity authentication scheme, and the main research contents and achievements include the following aspects: (1) the privacy protection defect existing in the security identity authentication scheme for the existing resource limited environment, Three anonymous identity authentication schemes based on different security elements are proposed. First, a global mobile network anonymous identity authentication scheme based on smart card is proposed (SCBASUA-GMN). The protocol security analysis and the AVISPA simulation experiment result show that the SCBASUA-GMN scheme provides user anonymity to protect the user's privacy, and can resist various attacks such as replay attack, impersonation attack, off-line password guessing attack, and parallel session attack. In addition, that SCBASUA-GMN scheme also has the functions of mutual authentication, forward security, fairness of key negotiation and user-friendliness. Secondly, an anonymous identity authentication scheme based on biological characteristics (BBASSUA-WSN) is proposed for wireless sensor network application environment. The results of the AVISPA simulation show that the BBASSUA-WSN scheme has reached the pre-determined safety target, and the security analysis result shows that the scheme realizes the user anonymity and can resist the active and passive attacks including the man-in-the-the-middle attack, the sensor node capture attack, and the like. At the same time, the BBASSUA-WSN scheme also supports mutual authentication and key negotiation fairness. Finally, a global mobile network anonymous identity authentication scheme (DIDBASUA-GMN) based on dynamic identity is proposed, and the anonymity and data link property of the user are realized, and further privacy protection is provided for the mobile user during the roaming process. The security analysis shows that the DIDBASUA-GMN scheme can resist a variety of attacks, including side-channel attacks, smart card loss attacks, and the like. (2) Two types of security and light-weight authentication schemes are proposed for the implementation efficiency defects existing in the security identity authentication scheme of the existing resource-limited environment. On the one hand, aiming at the global mobile network application environment, a lightweight and high-efficiency identity authentication scheme (LEAS-GMN) is proposed. In ord to better meet that constraint of resource-constrained application, the LEAS-GMN scheme use only one-way hash function and exclusive-OR operation with small computational overhead. The comparison of the performance and computational overhead of the similar scheme shows that the CPU cycle and execution time required for the LEAS-GMN scheme are the least, and the implementation efficiency is superior to the similar scheme. And the security analysis verifies that the LEAS-GMN scheme can resist various attacks such as a masquerading attack, a known session key attack and the like, and also meets the predetermined safety requirements and targets while improving the execution efficiency. on the other hand, aiming at the network application environment of the wireless sensor, a lightweight and high-efficiency identity authentication scheme (LEAS-WSN) is proposed. The LEAS-WSN scheme only relates to the symmetric encryption and the hash function in the authentication process, and the comparison results with the performance and energy consumption of the similar scheme show that, The required computational overhead and the number of messages to be transmitted in the LEAS-WSN scheme are the least; the resulting cryptographic operations and communication power consumption are also minimized, and are applicable to a resource-limited WSN environment. Moreover, the security analysis and the BAN logic prove that the LEAS-WSN scheme achieves the expected safety target, and can resist various active and passive attacks such as the gateway node bypass attack, the man-in-the-the-the-the-the-the-the-the-the-the-the-the-the-the-the-middle attack. (3) Aiming at the security assessment of multiple identity authentication schemes in the same application environment, a multi-attribute evaluation method based on fuzzy number intuitionistic fuzzy sets is proposed. First, the fuzzy number intuitionistic fuzzy Hamacher weight geometric operator, the fuzzy number intuitionistic fuzzy Hamacher ordered weighted geometric operator and the fuzzy number intuitionistic fuzzy Hamacher hybrid geometric operator are extended. Secondly, a multi-attribute evaluation method based on fuzzy number intuitionistic fuzzy Hamacher hybrid geometric operator is proposed. Finally, the effectiveness of the method is verified through the security assessment example of the identity authentication scheme.
【学位授予单位】:太原理工大学
【学位级别】:博士
【学位授予年份】:2016
【分类号】:TP309
【相似文献】
相关期刊论文 前10条
1 葛丽娜,钟诚,石润华;基于椭圆曲线密码体制的网上考试系统身份认证方案[J];中国远程教育;2003年17期
2 葛丽娜,钟诚,石润华;网上考试系统的一种身份认证方案[J];微机发展;2003年09期
3 李定川;;统计局网上直报的身份认证方案[J];互联网天地;2004年02期
4 曾文杰,周南润,曾贵华;基于隐形传态的跨中心量子身份认证方案[J];光电子·激光;2005年01期
5 朱江宁;;一种安全的面向群体的身份认证方案[J];辽东学院学报;2006年02期
6 王承鑫;;“网上审批”系统身份认证方案设计[J];科技资讯;2006年23期
7 王承鑫;;“网上审批”系统身份认证方案设计[J];科技资讯;2007年05期
8 桑林琼;王玉柱;;具有零知识特性的身份认证方案设计及分析[J];重庆科技学院学报(自然科学版);2008年04期
9 杨建平;;具有零知识特性的身份认证方案的设计及分析[J];内蒙古农业大学学报(自然科学版);2010年03期
10 刘婷婷;王文彬;;云计算中基于公平的安全判定相等协议的身份认证方案[J];国防科技大学学报;2013年05期
相关会议论文 前5条
1 张庆南;黄昊;邓雷升;;一种生物特征与公钥密码相结合的多层次身份认证方案[A];第十一届保密通信与信息安全现状研讨会论文集[C];2009年
2 陈爱群;叶震;高柯俊;郑利平;姚传茂;;一种基于椭圆曲线数字签名的身份认证方案[A];全国第十五届计算机科学与技术应用学术会议论文集[C];2003年
3 高作佳;;一种使用智能卡的身份认证方案[A];2006北京地区高校研究生学术交流会——通信与信息技术会议论文集(下)[C];2006年
4 李艳平;苏万力;王育民;;基于ID的身份认证方案的安全性分析和改进[A];中国电子学会第十五届信息论学术年会暨第一届全国网络编码学术年会论文集(上册)[C];2008年
5 黄海;蔺大正;周剑蓉;;基于一般接入结构的共享验证的身份认证方案[A];2005通信理论与技术新进展——第十届全国青年通信学术会议论文集[C];2005年
相关重要报纸文章 前1条
1 本报评论员 周飙;网络社区的开放潮流[N];21世纪经济报道;2008年
相关博士学位论文 前1条
1 王颖;资源受限环境安全身份认证方案研究[D];太原理工大学;2016年
相关硕士学位论文 前10条
1 曹征;无线传感器网络节点认证协议研究[D];西南交通大学;2015年
2 殷瑛;机会网络身份认证方案研究[D];南京邮电大学;2015年
3 文生印;WLAN系统中身份认证的研究[D];南京邮电大学;2015年
4 凡思琼;基于智能卡的身份认证方案的研究[D];上海交通大学;2015年
5 林浩;基于生物特征的远程身份认证方案的研究[D];济南大学;2016年
6 陈平;基于一次性密钥的图像口令身份认证方案研究与设计[D];兰州大学;2008年
7 黄家斌;基于生物特征的身份认证方案[D];上海交通大学;2013年
8 徐雯丽;云计算环境下的身份认证研究[D];南京邮电大学;2013年
9 邓婕;身份认证方案的研究与设计[D];四川师范大学;2007年
10 杨秀青;远程用户身份认证方案研究[D];华东交通大学;2009年
,本文编号:2497617
本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/2497617.html