An internet key exchange protocol based on public key infrastructure
Tóm tắt
Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.
Từ khóa
Tài liệu tham khảo
Catherine Meadows. Analysis of Internet key exchange protocol using the NRL protocol analyzer [A]. IEEE Symposium on Security and Privacy [C], May 1999: 216–231.
Park C S. On certificate-based security protocols for wireless mobile communication system[J]. IEEE Network, Sep./Oct. 1997: 50–55.
Harkins D, Carrel D. The Internet Key Exchange (IKE) [R]. RFC2409, Nov. 1998.
Martins K. IKE protocol analysis [J/OL]. http://www. imib. med. tu-dresden. de/imib/personal/Kai. html, Oct. 1998.
Naugle M G. Network Protocol [M]. McGraw-Hill, New York, 1998.
Maughan D, Schertler M, Schneider M, et al. Internet Security Association and Key Management Protocol (ISAKMP)[R]. RFC2408, Nov. 1998.
Molva R. Internet security architecture [J]. Computer Networks, 1999, 31: 787–804.
Housley R, Ford W, Polk W, Solo D. Internet Public Key Infrastructure, Part I: X. 509 Certificate and CRL Profile, 〈 draftietf-pkix-ipki-partl-06 〉 [R]. IETF PKIX Working Group, Oct. 1997.
Deering S, Hinden R. Internet Protocol, Version 6 (IPv6)[R]. RFC2460, Dec. 1998.
Kent S, Atkinson R. Architecture for the Internet Protocol R]. RFC2401, Nov. 1998.
Tzeng Z J, Tzeng W G. Authentication of mobile users in third generation mobile system [J]. Wireless Personal Communications, 2001, 16: 35–50.
Zhou J. Fixing a security flaw in IKE protocols [J]. Electronics Letters, 1999, 35(13): 1072–1073.