期刊文献+

通用可组合安全的WLAN密钥交换协议

Universally composable key exchange protocol for WLAN
下载PDF
导出
摘要 安全性是WLAN应用的核心问题,IEEE802.11i定义了WLAN安全基础框架,其中,四次握手协议4-WAY实现会话密钥交换与更新。分析表明4-WAY易遭受拒绝服务攻击,提出了一种改进会话密钥协商协议3-WAY,分析表明该协议具有更好的消息认证和完整性保护,以及高效性。采用通用可组合安全模型对3-WAY进行分析,证明该协议能够实现密钥交换理想函数,具有通用可组合安全性。该协议具有广泛适用性。 The security is the core in the applications of WLAN. The 4-WAY handshake protocol realized the key exchange and update in the WLAN security basement framework which was defined by IEEE 802. 11i. The analysis showed that the 4-WAY handshake was vulnerable to denial-of-service attack. This paper advanced the modified session key agreement protocol, 3-WAY,which was showed that it provided better information authentication,integrality protection and efficiency. In addition,analyzed the 3-way handshake protocol in the universally composable ( UC) security model and proved that this new protocol could realize the key-exchanged ideal function and came to the universally composable security. This new protocol has abroad flexibility.
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3869-3871,共3页 Application Research of Computers
基金 河南省青年骨干教师计划资助项目 河南省重点科技攻关资助项目(072102210029) 河南工业大学高层次人才基金项目资助(2007BS019) 河南工业大学科研基金项目资助(07XGG030 08XZZ022)
关键词 无线局域网 密钥交换协议 通用可组合安全 WLAN key negotiation protocol universally composable security
  • 相关文献

参考文献3

二级参考文献53

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2季庆光,冯登国.对几类重要网络安全协议形式模型的分析[J].计算机学报,2005,28(7):1071-1083. 被引量:23
  • 3张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 4沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 5IEEE Draft Amendment to Standard for Information Technology and Information Exchange Between Systems LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment: ESS Mesh Networking[S]. IEEE P802.11s/D1.0.March 2007.
  • 6IEEE Standard, Supplement to Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements -Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security[S]. IEEE 802.11i, July 2004.
  • 7PEARSON S. Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy[A]. Eds iTrust' 2005, LNCS 3477[C]. Berlin: Springer-Verlag, 2005. 305-320.
  • 8Trusted Computing Group. Trusted platform module main specification[EB/OL], https://www. trustedcomputinggroup.org/.
  • 9Trusted Computing Group. TCG storage architecture core specification[EB/OL], https://www. trustedcomputiuggroup.org/.
  • 10Trusted Computing Group. TCG trusted network connect tnc architecture for interoperability specification version 1.3 revision 6[EB/OL]. https://www. trustedcomputinggroup.org/.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部