参考文献 [ 1 ] 孙玉砚,刘卓华,李 强,等. 一种面向3G 接入的物联网安全架构[J]. 计算机研究与发展,2010,47(2): 327-332. [ 2 ] 夏文栋. 基于3G-WLAN 交互系统的物联网研究[J]. 微电子学与计算机,2011,28(7):139-142. [ 3 ] Arkko J,Haverinen H. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement ( EAP-AKA ) [ S ]. RFC 4187, Internet Engineering Task Force,2006. [ 4 ] Mun H,Han K,Kim K. 3G-WLAN Interworking:Security Analysis and New Authentication and Key Agreement Based on EAP-AKA[C]/ / Proceedings of Wireless Telecommunications Symposium. Washington D. C.,USA:IEEE Press,2009:1-8. [ 5 ] Pereniguez F, Kambourakis G, Marin-Lopez R, et al. Privacy-enhanced Fast Re-authentication for EAP-based Next Generation Network[J]. Computer Communications, 2010,33(14):1682-1694. [ 6 ] 许万福,侯惠芳. 3G-WLAN 互联网络中EAP-AKA 协议的分析与改进[J]. 计算机工程与应用,2010, 46(32):81-83. [ 7 ] 杨光华. 移动互联网安全热点分析[ EB / OL ]. [2011-03-14]. http:/ / www. cww. net. cn / TComment / html / 2011/ 3/ 14/ 2011314921357151_2. htm. [ 8 ] 冯福伟,李 瑛,徐冠宁,等. 基于集群架构的物联网身份认证系统[J]. 计算机应用,2013,33(S1):126-129. [ 9 ] Ngo H H,Wu X P,Le P D,et al. An Individual and Group Authentication Model for Wireless Network Services [J]. Journal of Convergence Information Technology, 2010, 5(1):82-94. [10] Chen Y W,Wang J T, Chi K H, et al. Group-based Authentication and Key Agreement [ J ]. Wireless Personal Communications,2010,62(4):965-979. [11] Aboudagga N, Refaei M T, Eltoweissy M, et al. Authentication Protocols for Ad Hoc Networks: Taxonomy and Research Issues[C] / / Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks. New York, USA:ACM Press,2005:96-104. [12] Kwon H,Cheon K Y,Roh K H,et al. USIM Based Authentication Test-bed for UMTS-WLAN Handover [EB/ OL ]. [2014-01-20]. http:/ / www. ieee-infocom. org. [13] Ou G. Ultimate Wireless Security Guide:An Introduction to LEAP Authentication[EB / OL]. (2012-06-15). http:/ / www. techrepublic. com/ article/ ultimate-wireless-securityguide- an-introduction-to-leap-authentication/ 6148551. 编辑 金胡考 |