期刊文献+

WAPI协议的可用性分析与改进 被引量:2

Availability Analysis and Improvements for WAPI
下载PDF
导出
摘要 本文分析WAPI安全关联建立过程存在的脆弱性。由于WAPI协议没有强调可用性,因此攻击者可通过来受保护的管理帧引入DoS攻击,本文对其造成的危害进行详细讨论,并给出合理的防御措施。为提高协议的健壮性与可用性,本文还讨论了协议失败的恢复手段,提出了一种改进的WAPI协议实施方案,在尽可能不改变原有协议的框架和封装结构的前提下,最大程度降低或避免所讨论的DoS攻击。 This paper analyzes the security of the establishment procedure of WAPI security association. Since the WAPI design does not emphasize its availability, it is possible to introduce several DoS attacks. We detail the DoS attacks on unprotected management {rames and propose some reasonable countermeasures. In order to enhance the robust and availability, some tradeoffs in failure-recovery strategies are discussed and an improved variant of WAPI is proposed to maintain its primary structure and encapsulation and address all the discussed vulnerabilities.
出处 《计算机科学》 CSCD 北大核心 2007年第10期84-87,102,共5页 Computer Science
基金 国家自然科学基金 微软亚洲研究院联合资助项目(60372048)(大规模宽带无线自适应Ab hoc网络) 教育部科学技术研究重点项目(104171)(大规模宽带无线分布式网络关键技术) 中科院研究生院信息安全国家重点实验室开放课题(无线Ad hoc网的安全技术)
关键词 无线局域网 WAPI 安全性 可用性 WLAN(Wireless Local Area Network), WAPI(WLAN Authentication and Privacy),Security, Availability
  • 相关文献

参考文献7

  • 1黄振海,郭宏,王育民,等.GB15629.11—2003/XG1-2006《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范》.中国标准出版社,2003
  • 2赖晓龙,曹军,铁满霞,等.GB15629.11—2003/XG1—2006《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单》.中国标准出版社,2006
  • 3He Changhua, Mitchell J C. Security Analysis and Improvements for IEEE 802. 11i. In: Proceedings of the 12th Annual Network and Distributed System Security .Symposium (NDSS05), 2005
  • 4Canetti R, Krawczyk H. Analysis of Key exchange Protocol and Their Use for Building Secure Channels[A]. In: Proceeding of Eurocrypt 2001: LNCS 2 045[C]. Berlin: Springer 2 Verlag, 2001. 453-474
  • 5AusCERT AA-2004. 02. Denial of Service vulnerability in IEEE 802. 11 wireless devices. May 13, 2004. http://www. auscert. org. au/render. html? it=4091
  • 6IEEE Computer Society LAN MAN Standards Committee. Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements. ANSI/IEEE Std 802. 11i, 2004-6-24
  • 7IEEE Computer Society LAN MAN Standards Committee. Portbased Network Access Control. ANSI/IEEE Std 802. 1x, 2004- 11-15

同被引文献15

  • 1张帆,马建峰.WAPI认证机制的性能和安全性分析[J].西安电子科技大学学报,2005,32(2):210-215. 被引量:29
  • 2杨寅春,张世明,张瑞山,陈克非.WAPI安全机制分析[J].计算机工程,2005,31(10):135-136. 被引量:8
  • 3厉丹,张永平,刘莘.无线局域网中WAPI安全机制分析[J].计算机工程与设计,2006,27(13):2393-2395. 被引量:5
  • 4李谢华,李建华,杨树堂,诸鸿文.WAPI接入鉴别过程的形式化分析与验证[J].计算机工程,2006,32(22):10-13. 被引量:5
  • 5Papadimitratos P, Haas Z J. Secure Routing for Mobile Ad hoc Networks//Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference CNDS 2002.
  • 6Sanzgiri K, Dahill B. A Secure Routing Protocol for Ad Hoc Networks//Proceedings of the 10^th IEEE International Conference on Network Protocols (ICAP'02).
  • 7RFC3280, Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,April 2002.
  • 8Canetti R,Krawczyk H. Analysis of key-exchange protocol and their use for building secure channels//Proceeding of Eurocrypt 2001, LNCS 2045. Berlin, Springer-Verlag, 2001 : 453-474.
  • 9Bellare M, Canetti R, Krawczyk H. A modular approach to the design and analysis of authentication and key-exchange protocols. 30th STOC, 1998 : 419-428.
  • 10Bellare M,Rogaway P. Entity authentication and key distribution//D. Stinson ed. Advances in Cryptology,-CRYPTO' 93, Lecture Notes in Computer Science Vol. 773, Springer-Verlag, 1994:232-249.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部