期刊文献+

可证明安全的WLAN Mesh接入认证协议

Provable secure authentication protocol for WLAN mesh
下载PDF
导出
摘要 针对目前WLAN Mesh安全解决方案中,一个新的Mesh设备在接入时要与其邻居及认证服务器之间进行两次802.1X认证和两次四步握手,大大增加了设备的接入时间和复杂性的问题,基于Diffie-Hellman密钥交换,采用签名认证方式,提出了一种新的接入认证协议。新的协议只需要四轮的协议交互便可以实现上述三者之间的相互认证和密钥确认,而不需要四步握手进行密钥确认。在DDH假定成立的前提下,新的协议在扩展模型中是可证明安全的,并且通信效率和计算效率都优于现有方案。 For the problem that a new mesh point accesses to WLAN meshes networks needs two executions of authentication protocol 802. 11x and four-way handshakes among supplicant, authenticator and authentication server, which would increase communication and computation casts in WLAN mash security solutions, an authentication protocol with signature based authentication model was proposed by using Diffie-Hellman key exchange technique. Four turns protocol interactions in the new protocol mutual authentication and key confirmation among supplicant, authenticator and authentication server can be realized with no handshake required. Finally, the analysis results show that the proposed protocol proves to be secure under DDH assumption and better than current solutions.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2007年第6期1354-1358,共5页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金资助项目(60633020 60503012 60573036)
关键词 计算机网络 认证协议 可证明安全 WLANMesh 802.11s computer networks authentication protocol provable security WLAN Mesh 802.11s
  • 相关文献

参考文献10

  • 1IEEE Draft Amendment to Standard for Information Technology-Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements-Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specificaions: Amendment: ESS Mesh Networking [S]. IEEE P802. 11s/D1.0, 2006. 被引量:1
  • 2IEEE Standard, Supplement to Standard for Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Requirements-Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security [S]. IEEE 802. 11i, 2004. 被引量:1
  • 3IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control[S]. IEEE Std 802.1X-2004, 2004. 被引量:1
  • 4Bellare M, Rogaway P, Entity authentication and key distribution[C]// Proceedings of CRYPTO'93, LNCS 773, Berlin: Springer-Verlag, 1994: 232- 249. 被引量:1
  • 5Bellare M, Canetti R, Krawczyk H. A modular approach to the design and analysis of authentication and key-Exchange protocols [C] // Proceedings of 30th Symposium on Theory of Computing, ACM, 1998: 419-428. 被引量:1
  • 6Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels [C] // Proceedings of EUROCRYPTO' 01, LNCS 2045. Berlin: SpringerVerlag, 2001: 453- 474. 被引量:1
  • 7Aboba B, Blunk L, Vollbrecht J, et al. Extensible Authentication Protocol[S]. RFC 3748, 2004. 被引量:1
  • 83GPP TS 21. 102, 3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture, Version 4. 2.2, Release 4[S]. 2001. 被引量:1
  • 9Dolev D, Yao A. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2):198-208. 被引量:1
  • 10Canetti R, Krawczyk H. Security analysis of IKE's signature-based key-exchange protocol [C] // Proceedings of CRYPTO' 02, LNCS 2442. Berlin: Springer-Verlag, 2002 : 143-161. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部