Abstract
This paper proposes an efficient and secure inner network access approach which is based on a heterogeneous Diffie-Hellman key exchange protocol in an unsecured network. The inner and outer network structure is commonly applied in various areas, such as different departments of government, enterprises. As the wireless communication network boosts up, the users in outer network try to use PDA, smart phone to access the inner network to acquire necessary information. Due to the limitation of the storage and computational capability of these mobile terminals, traditional secure inner network access approach which uses special cable to do the access is not suitable for this case. Therefore, we design a heterogeneous key exchange protocol for the mobile terminal in outer network and application server in inner network to negotiate the communication shared key. The gateway between inner and outer network can be protected from the third party attack by the trusted computing. The experimental results show that the heterogeneous key exchange protocol is efficient and secure for inner network access.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)
ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985), doi:10.1109/TIT.1985.1057074
Hellman, D.: http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#cite_note-0
WAP Forum: WAP 2.0 Technical White Paper, http://www.wapforum.org/what/WAPWhite_Paper1.pdf
WAP Forum: WAP public key infrastructure definition, http://www1.wapforum.org/tech/documents/WAP-217-WPKI-20010424-a.pdf
WAP Forum: WAP certificate and CRL profiles, http://www1.wapforum.org/tech/documents/WAP-211-WAPCert-20010522-a.pdf
WAP Forum. Wireless Transport Layer Security Specification, http://www1.wapforum.org/tech/documents/WAP-199-WTLS-20000218-a.pdf
Trask, N.T., Jaweed, S.A.: Adapting public key infrastructures to the mobile environment. BT Technology Journal 19(3), 76–80 (2001)
Berger, B.: Guide to Trusted Computing. Computer Technology Review (May 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xia, Y., Kuang, L., Mao, K. (2011). A Secure Network Access Approach Based on Heterogeneous Key Exchange Protocol. In: Tan, H., Zhou, M. (eds) Advances in Information Technology and Education. Communications in Computer and Information Science, vol 201. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22418-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-22418-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22417-1
Online ISBN: 978-3-642-22418-8
eBook Packages: Computer ScienceComputer Science (R0)