期刊文献+

IEEE802.11i密钥管理方案的研究与改进 被引量:1

Research and improvement of IEEE802.11i key management program
下载PDF
导出
摘要 802.11i的密钥管理方案需要经过四次握手产生PTK,然后经过组播握手产生GTK,加重了STA的计算负担,影响了无线漫游的效率,为此提出一种改进的密钥产生机制。改进后的方案采用EAPOL-Key来传输消息,不修改其帧结构,保持了对原802.11i协议的兼容,同时将四次握手加组密钥握手完成PTK和GTK分发变成只需四次握手就可以同时实现PTK和GTK分发。该方案缩短了密钥分发的过程,减少了分发环节,从而使得漫游环境下的密钥分发效率大大提高,减少了用户接入WLAN的延迟。 Aiming to 802.11 i key management program that can generate PTK and GTK via the way of the four-step handshakes and the multicast handshakes separately, which adds the burden of STA on a large scale and affects the efficiency of the wireless roaming. The key improved-based mechanism is proposed, the improved program uses EAPOL-Key to transmit messages, which not modifying the frame structure, maintaining the 802.11 i protocol compatible. It implements a program that distributed PTK and GTK from four-step handshakes and group-key handshakes reduce to four-step handshakes. Studies show that the program reduced the key distribution process and the distribution chain, so the efficiency of key distribution is greatly improved in roaming environment, and the delay of WLAN user access is reduced.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第22期4813-4816,共4页 Computer Engineering and Design
基金 高校自然科学基础研究基金项目(08KJB520009) 江苏省现代教育技术研究"十一.五"规划2009年滚动基金项目(13254) 南通市应用研究计划基金项目(K2008005)
  • 相关文献

参考文献3

二级参考文献18

  • 1袁建国,朱恺,方宁生,吴国新.802.1x/EAP-PEAP的研究与应用[J].计算机工程与设计,2006,27(10):1818-1820. 被引量:13
  • 2林林,李学明,陈勇.无线网络中动态组密钥管理方案[J].计算机工程与应用,2007,43(5):133-136. 被引量:3
  • 3JimGeierv 李馥娟等译 王群.无线局域网[M].北京:人民邮电出版社,2001..
  • 4IEEE Std 802.11 Wireless LAN Media Access Control(MAC) and Physical Layer(PHY) Specifications[S].1999.
  • 5Arbaugh W A,Shankar N,Wan Y C J,et al.Your 802.11 wireless network has no clothes[J].IEEE Wireless Communication,2002(12): 44-51.
  • 6IEEE Std 802.11i.Wireless medium access control (MAC) and physical layer (PHY) specifications: Medium Access Control (MAC) Security Enhancements[S].2004.
  • 7Wang Yi-ling,Damodaran D,Le P D.Efficient group key management in wireless networks[J].IEEE Information Technology : New Generations, 2006,4( 10/12 ) : 432-439.
  • 8Canetti R,Garay J,Itkis J,et al.Multicast security:a taxonomy and some efficient constructions[C]//Proceedings of the 6th ACM Computer and Communications Security Conference, 1999:93-100.
  • 9Wallner D,Harder E,Agee R.RFC2627 Key management for multicast:issues and architectures[S].IETF, 1999.
  • 10Wong C K,Gouda M,Lam S S.Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking, 2000,8 ( 1 ) : 16-30.

共引文献5

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部