Security Analysis of WAPI Access Authentication Protocol WAI

被引:0
|
作者
Zhang Ruihong [1 ]
Yang Wei [1 ]
机构
[1] Huanggang Normal Univ, Dept Comp Scinece & Technol, Huanggang 438000, Peoples R China
来源
INNOVATIVE COMPUTING AND INFORMATION, PT II | 2011年 / 232卷
关键词
Wireless Local Area Network; WAI; CK model; Unicast Key; KEY-EXCHANGE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication process of wireless local area network authentication and privacy infrastructure, namely, WAI protocol, is researched and analyzed, and the security analysis is made to its the security authentication and key-agreement process by using CK model. The analysis shows that: WAI can realize security attributes such as message integrity, mutual entity authentication, mutual key-control, key confirmation and so on, and it can also statisfy the secure goal of wireless local area network. Thus, it can be used to enhance the security of wireless local area network instead of WEP.
引用
收藏
页码:253 / 258
页数:6
相关论文
共 50 条
  • [1] Security enhancement of WAPI access authentication protocol (WAI)
    刘永磊
    金志刚
    Journal of Harbin Institute of Technology(New series), 2012, (06) : 42 - 46
  • [2] Security enhancement of WAPI access authentication protocol (WAI)
    刘永磊
    金志刚
    Journal of Harbin Institute of Technology, 2012, 19 (06) : 42 - 46
  • [3] On the security of WAI protocol in the third version of WAPI
    Tang, Zhao-Hui
    Xu, Li
    Chen, Zhide
    Guo, Fuchun
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 516 - 519
  • [4] A novel authentication protocol for wireless access security
    Wan C.
    Hu A.
    Zhang J.
    Journal of Convergence Information Technology, 2010, 5 (08) : 22
  • [5] A Correctness Proof of WAPI Certificate Authentication Protocol
    Tie Manxia
    Li Jiandong
    Huang Zhenhai
    Wang Yumin
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2310 - +
  • [6] Network Access Security for the Internet: Protocol for Carrying Authentication for Network Access
    Marin-Lopez, Rafa
    Pereniguez-Garcia, Fernando
    Gomez-Skarmeta, Antonio F.
    Ohba, Yoshihiro
    IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (03) : 84 - 92
  • [7] Security protocol analysis with improved authentication tests
    Li, Xiehua
    Yang, Shutang
    Li, Jianhua
    Zhu, Hongwen
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 123 - 133
  • [8] An improvement of authentication test for security protocol analysis
    Li, Xiangdong
    Wang, Qingxian
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 745 - 748
  • [9] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
  • [10] A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
    Jiang, Xin
    Liu, Mingzhe
    Yang, Chen
    Liu, Yanhua
    Wane, Ruili
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (01): : 45 - 59