Security Analysis of WAPI Access Authentication Protocol WAI

被引:0
|
作者
Zhang Ruihong [1 ]
Yang Wei [1 ]
机构
[1] Huanggang Normal Univ, Dept Comp Scinece & Technol, Huanggang 438000, Peoples R China
来源
INNOVATIVE COMPUTING AND INFORMATION, PT II | 2011年 / 232卷
关键词
Wireless Local Area Network; WAI; CK model; Unicast Key; KEY-EXCHANGE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication process of wireless local area network authentication and privacy infrastructure, namely, WAI protocol, is researched and analyzed, and the security analysis is made to its the security authentication and key-agreement process by using CK model. The analysis shows that: WAI can realize security attributes such as message integrity, mutual entity authentication, mutual key-control, key confirmation and so on, and it can also statisfy the secure goal of wireless local area network. Thus, it can be used to enhance the security of wireless local area network instead of WEP.
引用
收藏
页码:253 / 258
页数:6
相关论文
共 50 条
  • [31] A Design of Home Network Security Protocol using User Authentication and Access Control Technology
    Lee, Young Gu
    Kim, Hyun Chul
    Kim, Jung Jae
    Jun, Moon Seog
    ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 30 - 34
  • [32] On the security of three versions of the WAI protocol in Chinese WLAN implementation plan
    Tang, Qiang
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 1079 - 1085
  • [33] A lightweight security authentication protocol for RFID
    Guosheng Zhao
    Hongqi Bao
    Jian Wang
    Peer-to-Peer Networking and Applications, 2025, 18 (3)
  • [34] On the security of homage group authentication protocol
    Jaulmes, É
    Poupard, G
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2002, 2339 : 106 - 116
  • [35] Security Analysis and Improvement of an Access Control Protocol for WBANs
    Rastegari, Parvin
    Khalili, Mojtaba
    Sakhaei, Ali
    International Journal of Network Security, 2023, 25 (02) : 285 - 296
  • [36] Security analysis of a cloud authentication protocol using applied pi calculus
    Huszti, Andrea
    Olah, Norbert
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2019, 12 (01) : 16 - 25
  • [37] Security analysis and improvement of a user-friendly remote authentication protocol
    Wang, YJ
    Li, JH
    Tie, L
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 47 - 50
  • [38] Security analysis of the secure authentication protocol by means of coloured Petri nets
    Dresp, W
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 230 - 239
  • [39] Security and Energy Analysis on Revised Mutual Authentication Protocol in WiMAX Networks
    Padmanabhan, Jayashree
    Mariappan, Gunavathie
    NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 : 195 - 205
  • [40] Security analysis of extensible authentication protocol methods based on AAA architecture
    Lee, Jong-Hyouk
    Jung, Su-Jin
    Han, Young-Ju
    Chung, Tai-Myoung
    RECENT PROGRESS IN COMPUTATIONAL SCIENCES AND ENGINEERING, VOLS 7A AND 7B, 2006, 7A-B : 1311 - 1314