计算机科学 ›› 2016, Vol. 43 ›› Issue (11): 205-209.doi: 10.11896/j.issn.1002-137X.2016.11.040

• 信息安全 • 上一篇    下一篇

一种新颖的基于Hash函数的无线双向安全认证方案

王杰华,刘会平,邵浩然,夏海燕   

  1. 南通大学计算机科学与技术学院 南通226019,南通大学计算机科学与技术学院 南通226019,南通大学计算机科学与技术学院 南通226019,南通大学计算机科学与技术学院 南通226019
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金面上项目(61170171),江苏省“六大人才高峰”项目(2010-WLW-006),江苏省高校科研成果产业化推进项目(JHB2011-45),南通大学研究生创新项目(YKC14018)资助

Novel Two-way Security Authentication Wireless Scheme Based on Hash Function

WANG Jie-hua, LIU Hui-ping, SHAO Hao-ran and XIA Hai-yan   

  • Online:2018-12-01 Published:2018-12-01

摘要: 随着科技的不断发展,越来越多的网络设备接入到无线网络中,为了确保合法用户的正确识别连接,在Wen-Li认证方案的基础上提出了一种基于Hash函数的无线双向安全认证方案。该方案通过引入发送包序列号代替时间戳,避免网络延时对认证过程产生影响,且不需要设备之间时钟的严格同步。安全性与运算量的对比分析表明,较Wen-Li方案,所提方案能有效避免各种常见的网络攻击,具有更高的安全性,且运算量较小,计算复杂度较低,能有效降低实际系统的开销。

关键词: 双向认证,Hash函数,包序列号,中间人攻击,离线口令猜测攻击

Abstract: With the development of science and technology,more and more network devices are connected to the wireless network.In order to ensure the legitimate users’ correct identification and connections,based on the Wen-Li authentication scheme,a novel two-way security authentication wireless scheme based on hash function(TSAWSH) was proposed.By using the send packet sequence number instead of of timestamp,the TSAWSH can avoid the influence to the certification process caused by the network delay and needn’t the strict clock synchronization between the devices.By comparing the security and complexity analyses with the Wen-Li scheme,the TSAWSH can effectively avoid the common network attacks,has higher safe property and less computational quantity,and also has lower computational complexity.The TSAWSH can effectively reduce the overhead of the actual system.

Key words: Two-way authentication,Hash function,Packet sequence number,Man-in-the-middle attack,Off-line password guessing attack

[1] Saraswathi S,Renuka D S,Yogesh P.Secure and efficient Smart-Card-Based remote user authentication scheme for multi-server environment[J].Candian Journal of Eelectrical and Computer Engineering,2015,38(1):20-30
[2] Chen Yan-li,Du Ying-jie,Yang Geng.Efficient attribute-based authenticated key agreement protocol[J].Computer Science,2014,41(4):150-154(in Chinese) 陈燕俐,杜英杰,杨庚.一种高效的基于属性的认证密钥协商协议[J].计算机科学,2014,41(4):150-154
[3] Qiu Hui-ming,Yang Yi-xian,Hu Zheng-min.A new mutual user authentication scheme using smart card[J].Application Research of Computer,2005,22(12):103-105(in Chinese) 邱慧敏,杨义先,胡正民.一种新的基于智能卡的双向身份认证方案设计[J].计算机应用研究,2005,22(12):103-105
[4] Lamport L.Password authentication with insecure communication[J].Communication of the ACM,1981,24(11):770-772
[5] Hwang M S,Li L H.A new remote user authentication scheme using smarts[J].IEEE Transactions on Consumer Electronics,2000,46(1):28-30
[6] Zhan Li,Yao Guo-xiang,Qiang Heng-chang.Improved mutual authentication scheme based on smartcard for cloud computing [J].Computer Engineer and Design,2014,35(2):440-444(in Chinese) 詹丽,姚国祥,强衡畅.改进的基于smartcard的云用户双向认证方案[J].计算机工程与设计,2014,35(2):440-444
[7] Das M L,Saxena A,Gulati V P.A dynamic ID-based remoteuser authentication scheme[J].IEEE Transactions on Consumer Electronics,2004,50(2):629-631
[8] Wang Y Y,Liu J Y,Xiao F X,et al.A more efficient and secure dynamic ID-based remote user authentication scheme[J].Computer Communication,2009,32(4):583-585
[9] Wen F,Li X.An improved dynamic id-based remote user au-thentication with key agreement scheme[J].Journal of Compu-ter Electrical Engineering,2012,38(2):381-387
[10] Karuppiah M,Saravan R.A secure remote user mutual authentication scheme using smart cards[J].Journal of Information Security and Application,2014,19(4):282-294
[11] Gan Hong,Pan Dan.Research on dynamic ID-based remote user authentication scheme[J].Digital Communication,2014,41(5):1-5(in Chinese) 甘宏,潘丹.基于动态身份远程用户认证方案的研究[J].数字通信,2014,41(5):1-5
[12] Liu J Y,Zhou A M,Gao M X.A new mutual authenticationscheme based on nonce and smart cards[J].Computer Communications,2008,31(10):2205-2209
[13] Huang H F,Liu S E,Chen H F.Designing a new mutual au-thentication scheme based on nonce and smart cards[C]∥International Symposium on Parallel and Distributed Processing with Application,ISPA 2010.Taipei,Taiwan,2010:570-573
[14] Li C T,Hwang M S.A lightweight anonymous routing protocol without public key en/decryption for wireless ad hoc network[J].Information Science,2011,181(23):5333-5347

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!