期刊文献+

基于EAP/RADIUS的WLAN认证和密钥分配协议

Authentication and Key Distribution Protocol in WLAN Based on EAP/RADIUS
下载PDF
导出
摘要 研究了无线局域网的认证机制,描述了EAP/RADIUS协议在IEEE802.1x标准中的消息封装格式,针对基于端口访问控制协议的缺陷,提出一种新的应用于WLAN的认证和密钥分配方案,并设计详细协议流程。该协议基于EAP/RADIUS认证框架,使用服务令牌将认证和授权结合起来,授权校验的同时进行密钥分配,完善了WLAN的访问控制机制。 Authentication mechanism of WLAN is studied, and message packet format of EAP/RADIUS protocol in IEEE802.1x standard is described. With respect to the defects of port-based access control protocol, a new authentication and key distribution method for WLAN is presented with detailed protocol design based on EAP/RADIUS authentication frame. In this protocol, authentication and authorization are combined using service token, and key is being distributed in the token verification process.
出处 《电子科技》 2006年第7期1-4,共4页 Electronic Science and Technology
基金 Philips大学研究计划资助项目
关键词 无线局域网 EAP/RADIUS协议 访问控制 令牌 WLAN EAP/RADIUS protocol access control token
  • 相关文献

参考文献1

二级参考文献10

  • 1[1]NEEDHAM R, SCHROEDER M. Authentication Revisited[J].Operating system review, 1987,21 ( 1 ), 7.
  • 2[2]BURROWS M, ABADI M, NEEDHAM R. A logic of authentication. SRC Technical Report NO. 39[ R]. Digital Equipment Corporation. 1989.
  • 3[3]ABADI M, NEEDHAM R. Prudent Engineering Practice for Cryptographic Protocols[R]. DEC SRC Research Report 125.1994.
  • 4[4]ANDERSON R, NEEDHAM R. Robust Principles for Public Key Protocols[A]. Crypto[ C]. 1995.
  • 5[5]GONG L, NEEDHAM R, YAHALOM R. Reasoning about Belief in Cryptographic Protocols[A]. In: Proceedings of the 1990IEEE Computer Society Symposium on Research in Security and Privacy[ C ]. Los Alamitos, California: IEEE Computer Society Press, 1990.234~248.
  • 6[6]ABADI M,TUTTLE M.A Semantics for a Logic of Authentication[A]. In:Proceedings of the Tenth ACM Symposium on Principles of Distributed Compting[C]. ACM Press, 1991. 201~216.
  • 7[7]PAUL C van Oorschot. Extending Cryptographic Logics of Belief to Key Agreement Protocols[A]. In: Proceedings of the First ACM Conference on Computer and Communications Security[C]. 1993. 232~243.
  • 8[8]NESSETT D. A Critique of the Burrows, Abadi and Needham Logic[J]. ACM Operating System Review, 1990,24(2): 35~38.
  • 9[9]MAO W,BOYD C.Towards Formal Analysis of Security Protocols [ A ]. Proceedings of the Computer Security Foundations Workshop VII[C]. 1993. 147~158.
  • 10[10]OTWAY D, REES O. Efficient and Timely Mutual Authentication[ J ]. Operating Systems Review, 1987,21 ( 1 ): 8~10.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部