Security Analysis of WAPI Access Authentication Protocol WAI

被引:0
|
作者
Zhang Ruihong [1 ]
Yang Wei [1 ]
机构
[1] Huanggang Normal Univ, Dept Comp Scinece & Technol, Huanggang 438000, Peoples R China
来源
INNOVATIVE COMPUTING AND INFORMATION, PT II | 2011年 / 232卷
关键词
Wireless Local Area Network; WAI; CK model; Unicast Key; KEY-EXCHANGE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication process of wireless local area network authentication and privacy infrastructure, namely, WAI protocol, is researched and analyzed, and the security analysis is made to its the security authentication and key-agreement process by using CK model. The analysis shows that: WAI can realize security attributes such as message integrity, mutual entity authentication, mutual key-control, key confirmation and so on, and it can also statisfy the secure goal of wireless local area network. Thus, it can be used to enhance the security of wireless local area network instead of WEP.
引用
收藏
页码:253 / 258
页数:6
相关论文
共 50 条
  • [21] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [22] Security analysis of the generalized key agreement and password authentication protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    IEEE COMMUNICATIONS LETTERS, 2001, 5 (11) : 462 - 463
  • [23] Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    Wireless Personal Communications, 2013, 69 : 1583 - 1596
  • [24] Analysis and Design of Group RFID Tag Security Authentication Protocol
    Zang, Ke
    Xu, He
    Zhu, Feng
    Li, Peng
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2019), 2020, 993 : 637 - 645
  • [25] Security analysis of an authentication and key agreement protocol for satellite communications
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 4300 - 4306
  • [26] Security analysis and improvements of authentication and access control in the internet of things
    Ndibanje, Bruce
    Lee, Hoon-Jae
    Lee, Sang-Gon
    Sensors (Switzerland), 2014, 14 (08): : 14786 - 14805
  • [27] Security Analysis of a Cocktail Protocol with the Authentication and Key Agreement on the UMTS
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    IEEE COMMUNICATIONS LETTERS, 2010, 14 (04) : 366 - 368
  • [28] Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
    Ndibanje, Bruce
    Lee, Hoon-Jae
    Lee, Sang-Gon
    SENSORS, 2014, 14 (08): : 14786 - 14805
  • [29] Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol
    Feng, Tao
    Wu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [30] Design and analysis on trusted network equipment access authentication protocol
    Lai, Yingxu
    Chen, Yinong
    Zou, Qichen
    Liu, Zenghui
    Yang, Zhen
    SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 : 157 - 169