Skip to main content

A Secure Network Access Approach Based on Heterogeneous Key Exchange Protocol

  • Conference paper
Advances in Information Technology and Education

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 201))

  • 2183 Accesses

Abstract

This paper proposes an efficient and secure inner network access approach which is based on a heterogeneous Diffie-Hellman key exchange protocol in an unsecured network. The inner and outer network structure is commonly applied in various areas, such as different departments of government, enterprises. As the wireless communication network boosts up, the users in outer network try to use PDA, smart phone to access the inner network to acquire necessary information. Due to the limitation of the storage and computational capability of these mobile terminals, traditional secure inner network access approach which uses special cable to do the access is not suitable for this case. Therefore, we design a heterogeneous key exchange protocol for the mobile terminal in outer network and application server in inner network to negotiate the communication shared key. The gateway between inner and outer network can be protected from the third party attack by the trusted computing. The experimental results show that the heterogeneous key exchange protocol is efficient and secure for inner network access.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  2. ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985), doi:10.1109/TIT.1985.1057074

    Article  MathSciNet  MATH  Google Scholar 

  3. Hellman, D.: http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#cite_note-0

  4. WAP Forum: WAP 2.0 Technical White Paper, http://www.wapforum.org/what/WAPWhite_Paper1.pdf

  5. WAP Forum: WAP public key infrastructure definition, http://www1.wapforum.org/tech/documents/WAP-217-WPKI-20010424-a.pdf

  6. WAP Forum: WAP certificate and CRL profiles, http://www1.wapforum.org/tech/documents/WAP-211-WAPCert-20010522-a.pdf

  7. WAP Forum. Wireless Transport Layer Security Specification, http://www1.wapforum.org/tech/documents/WAP-199-WTLS-20000218-a.pdf

  8. Trask, N.T., Jaweed, S.A.: Adapting public key infrastructures to the mobile environment. BT Technology Journal 19(3), 76–80 (2001)

    Article  Google Scholar 

  9. Berger, B.: Guide to Trusted Computing. Computer Technology Review (May 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xia, Y., Kuang, L., Mao, K. (2011). A Secure Network Access Approach Based on Heterogeneous Key Exchange Protocol. In: Tan, H., Zhou, M. (eds) Advances in Information Technology and Education. Communications in Computer and Information Science, vol 201. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22418-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22418-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22417-1

  • Online ISBN: 978-3-642-22418-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics