期刊文献+

协议组合逻辑安全的WiMAX无线网络认证协议 被引量:6

Security Authentication Protocol for WiMAX Wireless Network Based on Protocol Composition Logic
下载PDF
导出
摘要 国际标准IEEE802.16e-2005中PKMv2协议的安全性是WiMAX无线网络安全的重要保证。论文基于协议组合逻辑(PCL)分析了PKMv2协议中认证协议的安全性,发现PKMv2安全认证协议存在交错攻击,在此基础上基于协议演绎系统(PDS)提出了一种新的WiMAX无线网络安全认证协议,并使用协议组合逻辑(PCL)给出新协议的模块化正确性和安全性证明,新协议相对于PKMv2安全认证协议更加安全,更适应WiMAX无线网络复杂的网络应用环境。 IEEE 802.16e-2005 standard's PKMv2 protocol is an important secure guarantee for WiMAX (Worldwide Interoperability for Microwave Access) wireless network. In this paper,based on Protocol Composition Logic (PCL),the PKMv2 authentication protocol's security is analyzed,the interleaving attack is found,and a new authentication protocol is proposed by using the Protocol Derivation System (PDS) in WiMAX wireless network based on the vulnerability of system security,finally a formal correctness and security proof of it is presented with Protocol Composition Logic (PCL). This new protocol is more secure than the PKMv2 security authentication protocol,and more suitable for complicated wireless network application environment used in WiMAX.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第9期2106-2111,共6页 Journal of Electronics & Information Technology
基金 国家高技术研究发展计划(863)(2007AA01Z429) 国家自然科学基金(60702059 60972078) 甘肃省自然科学基金(2007GS04823) 网络安全与密码技术福建省高校重点实验室开放课题(09A006) 兰州理工大学博士基金(BS14200901)资助课题
关键词 无线网络 认证协议 协议演绎系统 协议组合逻辑 WIMAX Wireless network Authentication protocol Protocol Derivation System (PDS) Protocol Composition Logic (PCL) WiMAX
  • 相关文献

参考文献18

  • 1Yarali A and Rahman S.WiMAX broadband wireless access technology:Services,architecture and deployment models[C].Electrical and Computer Engineering,2008.CCECE 2008,Canada,2008:77-82. 被引量:1
  • 2IEEE 802.16e-2005.Air interface for fixed broadband wireless access systems,Amendment 2:Physical and medium access control layers for combined fixed and mobile operation in licensed bands[S] ,NJ,USA,IEEE Press,2006. 被引量:1
  • 3Kim Dongmyoung,Cai Hua,and Na Minsoo,et al..Performance measurement over Mobile WiMAX/IEEE 802.16e network[C] ,2008 IEEE International Symposium on A World of Wireless,Mobile and Multimedia Networks,Newport Beach,CA,United states,2008:1-8. 被引量:1
  • 4Agrawal Dharma P,Gossain Hrishikesh,and Cavalcanti Dave,et al..Recent advances and evolution of WLAN and WMAN standards[C].IEEE Wireless Communications,USA,2008:54-55. 被引量:1
  • 5Johnston D and Walker J.Mutual authentication for PKMv2,IEEE C802.16e-04_229rl.2004. 被引量:1
  • 6Liu Fu-qiang and Lu Lei.A WPKI-Based security mechanism for IEEE 802.16e[C].WiCOM International Conference,Wuhan,2006:1-4. 被引量:1
  • 7Sun Hung-min,Lin Yue-hsun,and Chen Shuai-min,et al..Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks[C].2007 IEEE Region 10 Conference,Taipei,2007:1-4. 被引量:1
  • 8Shon Taeshik and Choi Wook.An analysis of mobile WiMAX security:vulnerabilities and solutions[J].Lecture Notes in Computer Science,2007,4658:88-97. 被引量:1
  • 9Xu Sen and Huang Chin-tser.Attacks on PKM protocols of IEEE 802.16 and its later versions[C].Proceedings of 3rd International Symposium on Wireless Communication System (ISWCS 2006),Valencia,2006:185-189. 被引量:1
  • 10Datta A.Security analysis of network protocols:compositional reasoning and complexity-theoretic Foundations[D].[Ph.D.dissertation] ,Computer Science Department,Stanford University,2005. 被引量:1

二级参考文献11

  • 1黄振海,郭宏,王育民等.GB15629.11-2003《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范》.北京,中国标准出版社,2003. 被引量:1
  • 2赖晓龙,曹军,铁满霞等.GB15629.11-2003/XG1-2006《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单》,北京:中国标准出版社,2006年. 被引量:1
  • 3Cremers C. On the Protocol Composition Logic PCL. http: //arxiv.org/abs/0709.1080v4, 2007. 被引量:1
  • 4Mitchell J C, Shmatikov V, and Stern U. Finite-state analysis of ssl 3.0. Proceedings of the Seventh USENIX Security Symposium, San Antonio, 1998: 201-216. 被引量:1
  • 5Datta A, Derek A, and Mitchell J C, et al.. A derivation system for security protocols and its logical formalization. Proceedings of 16th IEEE Computer Security Foundations Workshop, Asilomar, 2003: 109-125. 被引量:1
  • 6Datta A, Derek A, and Mitchell J C, et al.. A derivation system and compositional logic for security protocols. Journal of Computer Security, 2005, 13(3): 423-482. 被引量:1
  • 7Derek A. Formal analysis of security protocols: Protocol composition logic. [Ph.D. dissertation], Computer Science Department, Stanford University, December 2006. 被引量:1
  • 8Durgin N, Mitchell J C, and Pavlovic D. A compositional logic for proving security properties of protocols. Journal of Computer Security, 2003, 11(4): 677-721. 被引量:1
  • 9Datta A, Derek A, Mitchell J C and Roy A. Protocol Composition Logic (PCL). http://www.stanford.edu/- danupam/ddmr-pcl06.pdf, 2006. 被引量:1
  • 10He C H, Sundararajan M, and Datta A, et al.. A modular correctness proof of IEEE 802.11i and TLS. Proceedings of 12th ACM Conference on Computer and Communications Security, Alexandria, 2005: 2-15. 被引量:1

共引文献6

同被引文献28

引证文献6

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部