期刊文献+

一种新的基于Client-puzzle的WAPI认证协议抗拒绝服务攻击方案

A novel scheme of Dos-resistant WAPI authentication protocol based on Client-puzzle
下载PDF
导出
摘要 针对WAPI协议的资源消耗攻击能够耗尽接入点(AP)的资源,提出一种新的基于Client-puzzle的WAPI认证协议抗拒绝服务攻击方案。分析了WAPI协议中的关联和认证过程存在的关键问题;利用subset sum构造puzzle以及将Subset sum puzzle应用于WAPI协议中;从计算量、Granularity特性、Non-parallelization特性和抗DoS攻击能力等方面分析所提出方案的效果。该方案能够很好地保证客户端和无线接入点之间资源的平衡,降低了资源消耗型无线网络攻击和潜在的拒绝服务攻击,增强了WAPI无线网络的抗拒绝服务攻击的能力。 Resource depletion attack against WAPI protocol exhausts access point(AP) resources.A novel client-puzzle-based DoS-resistant scheme of WAPI is proposed to strengthen the DoS-resistant ability of WAPI wireless networks.Firstly,analysing the key issue of the association and certification process in the WAPI protocol.Secondly,constructing puzzle by subset sum and applying the subset sum puzzle in WAPI protocol.Finally,analyzing the scheme's effectiveness from computation Granularity,Non-parallelization and anti-DoS attack capability.This scheme keeps a better resource balance between the AP and sta,reduces the affection of resource depletion attack and the potential DoS attack,and enhances the WAPI wireless network against denial of service attack capability.
作者 蒋林智 丁勇
出处 《桂林电子科技大学学报》 2012年第1期35-39,共5页 Journal of Guilin University of Electronic Technology
基金 六安市定向委托皖西学院市级重点研究项目(2010LWA004) 国家自然科学基金(60963024) 广西自然科学基金(0991079)
关键词 拒绝服务 无线网络安全 关联认证 denial of service wireless network security access authentication
  • 相关文献

参考文献4

二级参考文献25

  • 1张帆,马建峰.WAPI认证机制的性能和安全性分析[J].西安电子科技大学学报,2005,32(2):210-215. 被引量:29
  • 2HOULE K,WEAVER G,LONG N.Trends in denial of service attack technology[R].Technical report,CERT Coordination Center,Carnegie Mellon University,2001.
  • 3CHANG R K C.Defending against flooding-based distributed denial-of-service attacks[J].IEEE Communications Magazine,2002,40(10):42-51.
  • 4SHARAFAT A R,FALLAH M S.A measure of resilience against denial of service attacks in computer networks[J].Journal of Computer Systems Science & Engineering,2002,17(9):259-267.
  • 5AMOROSO E.A policy model for denial of service[C]//Proc.Computer Security Foundations Workshop III,Franconia,NHUSA,1990.110-114.
  • 6MILLEN J K.A resource allocation model for denial of service[C]//Proc.IEEE Computer Society Symposium on Security and Privacy,USA,1992.137-147.
  • 7MEADOWS C.A formal framework and evaluation method for network denial of service[C]//Proc.12th IEEE Computer Security Foundations Workshop,Italy,1999.4-13.
  • 8MATSUURA H,IMAI H.Protection of authenticated key-agreement protocol against a denial-of-service attack[M].Lecture Notes in Computer Science,Springer-Verlag,1999,1726:169-182.
  • 9MATSUURA H,IMAI H.Modification of internet key exchange resistant against denial-of-service[C]//Proc.of Internet Workshop 2000 (IWS2000),2000,167-174.
  • 10AURA T,NIKANDER P,et al.Dos-resistant authentication with client puzzles[C]//Lecture Notes In Computer Science archive Revised Papers from the 8th International Workshop on Security Protocols table of contents,Springer-Verlag,2001,2133:170-177.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部