当前位置>主页 > 期刊在线 > 信息安全 >

信息安全22年12期

关于一种无线登录方案的安全性分析
田力
(天津光电通信技术有限公司,天津 300221)

摘  要:近年来,基于网络安全技术的研究越发活跃,各种新兴的应用方案层出不穷,鉴于无线网络环境的开放性,对数据传输进行身份验证就显得尤为重要。文章介绍了图尔卡诺维奇等针对无线传感器网络提出的一种关于用户认证及传输协议的研究方案,对该方案进行了详细的探讨,指出该方案所存在的安全性弱点,由此明确了在该领域进行持续性研究的可能思路。


关键词:安全漏洞;无线传感器;网络安全



DOI:10.19850/j.cnki.2096-4706.2022.012.038


中图分类号:TN929.5                                      文献标识码:A                                  文章编号:2096-4706(2022)12-0143-03


Security Analysis on a Wireless Login Scheme

TIAN Li

(TOEC Technology Co., Ltd., Tianjin 300221, China)

Abstract: In recent years, the research on network security technology has become more and more active, and various emerging application schemes emerge in endlessly. In view of the openness of wireless network environment, it is particularly important to verify the identity of data transmission. This paper introduces a research scheme on user authentication and transmission protocol proposed by Turkanovic and others researchers for wireless sensor networks, discusses the scheme in detail, points out the security weaknesses of the scheme, and clarifies the possible ideas on continuous research in this field.

Keywords: security vulnerability; wireless sensor; network security


参考文献:

[1] LU Y R,WANG D,OBAIDAT M S,et al. Edge-assisted Intelligent Device Authentication in Cyber-Physical Systems [EB/OL]. [2022-04-26].https://ieeexplore.ieee.org/abstract/document/9714494. DOI:10.1109/JIOT.2022.3151828.

[2] LU Y R,XU G Q,LI L X,et al. Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks [J].IEEE Systems Journal,2019,13:1454-1465.

[3] LU Y R,ZHAO D W. Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service [J].Computer Communications,2022,182:22-30.

[4] TURKANOVIC M,BRUMEN B,HOLBL M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks based on the Internet of Things notion [J].Ad Hoc Net-works,2014,20:96-112.

[5] TURKANOVIC M,&HOLBL M. Notes on “A temporalcredential-based mutual authentication andkey agreement scheme for wireless sensor networks” [J].Wireless Personal Communications, 2013,77:907-922.

[6] YANG W H,SHIEH S P. Password authentication schemes with smart cards [J].Computer & Security,1999,18(8):727-733.


作者简介:田力(1978—),男,汉族,天津人,高级工程师,本科,研究方向:通信、通信系统和通信安全领域的研究和开发。