期刊文献+

IEEE 802.11i基于Kerberos架构认证的形式化分析

Analysis for IEEE 802.11i Based on Kerberos Authentication Framework by Formal Methods
下载PDF
导出
摘要 形式化方法对安全协议的分析有着无可替代的优势,串空间模型又是众多形式化方法中有良好扩展性的方法之一。利用串空间模型对IEEE 802.11i的认证方式中基于Kerberos架构认证进行了机密性和认证性证明,并得出其安全性可靠的结论。最后也提出了形式化方法的不足之处和未来研究方向。 Formal methods have irreplaceable advantages for security protocol analysis,and strand space model have good scalability in the large number of formal methods.In this paper,it analyses the confidentiality and authentication of the IEEE 802.11i based on Kerberos authentication by strand space model.And it reaches the conclusions of agreement on security and reliability about protocol.Finally the inadequacies of formal methods and future research directions are also raised.
机构地区 中国人民解放军
出处 《中国电子科学研究院学报》 2010年第2期182-186,共5页 Journal of China Academy of Electronics and Information Technology
关键词 IEEE 802.11i协议 KERBEROS协议 形式化方法 串空间模型 IEEE 802.11i protocol Kerberos protocol formal methods strand space model
  • 相关文献

参考文献7

  • 1IEEE Standard 802.11i.IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems Local and Metropolitan Area Net Works Specific Requirements Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications:Medium Access Control (MAC) Security Enhancements[S].New York:Institute of Electrical and Electronics Engineers,2004.
  • 2NEUMNNA C.The Kerberos Network Authentication Service(V5).RFC4120[S].2005.
  • 3LAN/MAN STANDARDS COMMITTEE.IEEE Std 802.1XTM-2004:Port-Based Network Access Control[S].2004.
  • 4FABREGA F,HERZOG J,GUTTMAN J.Strand Space:Why is a Security Protocol Correct[C]//Proceedings of the 1998 IEEE Symposium on Security and Privacy,Los Alamitos:IEEE Computer Society Press,1998:160-171.
  • 5FABREGA F,HERZOG J,GUTTMAN J.Honest ideals on Strand Space[C]//Proceedings of the IEEE Computer Security Foundations Workshop XI,Los Alamitos:IEEE Computer Society Press,1998:66-77.
  • 6FABREGA F,HERZOG J,GUTTMAN J.Strand Spaces:Proving Security Protocols Correct[J].Journal of Computer Security,1999,7(2/3):191-230.
  • 7BELLOVIN S M,MERRITT M.Limitations of the Kerberos Authentication System[J].ACM SIGCOMM Computer Communication Review,1990,20(5):119-132.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部