期刊文献+

可信接入鉴别协议的研究与设计 被引量:1

Study and design of access authentication protocol based on TPM
下载PDF
导出
摘要 在对我国自主制定的无线局域网国家标准WAPI中WAI的安全接入过程分析的基础上,针对该协议存在终端完整性安全隐患,引入完整性度量的思想,提出基于可信平台模块(TPM)的WAI协议方案—TWAI。该方案利用TPM的本地保护和平台证实等功能来保证通信各个环节的安全可靠,并利用CK模型对其过程进行了安全性分析以及可信性分析。分析结果表明,TWAI能够实现终端完整性保护、双向实体认证等安全目标,从而增强了WAI协议运行的安全性。 WAPI is the national standard designed by China for the WLAN.On the basis of thoroughly researches on the WAI security access of WAPI,this paper proposes an improved WAI based on TPM by using integrity measurement,which is called TWAI.The scheme ensures the security and dependability of every communicating section by the functions of TPM such as local protection and platform attestation.Then this paper analyzes the security with CK model and the trustworthiness.The result indicates that TWAI can achieve the goals such as integrity protection of entitys and two-way authentication,which enhances the security of WAI.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第34期78-81,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.60633020 国家高技术研究发展计划(863)No.2007AA01Z438200 西安电子科技大学计算机网络与信息安全教育部重点实验室开放课题(No.2007CNIS-06)~~
关键词 无线局域网鉴别和保密基础结构(WAPI) 平台完整性认证 可信计算 可信平台模块 WLAN Authentication and Privacy Infrastructure (WAPI) platform integrity authentication trusted computing Trusted Platform Module(TPM)
  • 相关文献

参考文献10

  • 1IEEE Standard 802.11.IEEE STANDARDS BOARD.802 part 11: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) Specification[S]. 1999.
  • 2中华人民共和国国家标准.GB15629.11-2003(信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范)[S].2003.
  • 3中华人民共和国国家标准.GB15629.11-2003/XG1-2006,信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范,第1号修改单[s].2006.
  • 4TCG Specification Architecture Overview Specification Version 1.2 [S/OL].2004-04-28.http://www.trustedcomputing.org.
  • 5Sailer R,Zhang X,Jaeger T.Design and implementation of a TCG- based integrity measurement arehitecture[C]//USEN IX Association, 2004.
  • 6TPM Main Partl Design Principles Specification Version 1.2 Level 2 Revision 103[S].2007-07-09.
  • 7TPM Main Part2 Structures of the TPM Specification Version 1.2 Level 2 Revision 103[S].2006-10-26.
  • 8TPM Main Part3 Commands Specification Version 1.2 Level 2 Revision 103[S].2006-10-26.
  • 9Canetti R,Krawczyk H.Analysis of key-exchange protocol and their use for building secure channels[C]//Proceedings of Eurocrypt'01. Berlin: Springer-Verlag, 2001 : 453-474.
  • 10Bellare M, Canetti R, Krawezyk H.A modular approach to the design and analysis of authentication and key-exchange protocols[C]// Proceedings of the 30th Annual ACM Symposium on Theory of Computing.New York :ACM Press, 1998:419-428.

同被引文献16

  • 1张帆,马建峰.WAPI认证机制的性能和安全性分析[J].西安电子科技大学学报,2005,32(2):210-215. 被引量:29
  • 2张帆,马建峰.WAPI实施方案的安全性分析[J].西安电子科技大学学报,2005,32(4):545-548. 被引量:11
  • 3李兴华,马建峰.WAPI实施方案中的密钥协商协议的安全性分析[J].计算机学报,2006,29(4):576-580. 被引量:12
  • 4LAN/MAN Standards Committee of the IEEE Computer Society. IEEE standard 802.11-1999. In- formation technology-telecommunications and in- formation exchange between systems-local and metropolitan area networks-specific requirements: Part Ii. wireless LAN medium access control (mac) and physical layer (phy) specificationsIS]. Piscata- way: IEEE Standards Boards 1999.
  • 5中国国家标准化管理委员会.GB-15629.11-2003,信息技术,系统间远程通信和信息交换(局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范).北京:中国标准出版社,2003.
  • 6中国国家标准化管理委员会.GB-15629.11-2003,信息技术,系统间远程通信和信息交换(局域网和城域网特定要求第1l部分:无线局域网媒体访问控制和物理层规范2.4GHz频段较高速物理层扩展规范实施指南).北京:中国标准出版社,2004.
  • 7中国国家标准化管理委员会.GB-15629.11-2003/XG1-2006,信息技术,系统间远程通信和信息交换(局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范,第1号修改单).北京:中国标准出版社,2006.
  • 8ZHANG Fan, MA Jian-feng. Security analysis on Chinese wireless LAN standard and its solu- tion[C]//Proc of the 34th International Confer- ence on Parallel Processing Workshops. Oslo: IEEE Computer Society, 2005: 436-443.
  • 9LI Xing-hua, MOON S J, MA Jian-feng. On the security of the authentication module of Chinese WLAN standard implement plan[C]//Proc of the 4th International Conference on Applied Crypto- graphy and Network Security. New York: Springer- Verlag, 2006: 340-348.
  • 10QIANG Tang. On the security of three versions of the WAI protocol in Chinese WLAN implement plan[C]//Proc of the 2th International Conference on Communications and Networking. New York: IEEE Explore Digital Library, 2007: 333-339.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部