Security Analysis of WAPI Access Authentication Protocol WAI

被引:0
|
作者
Zhang Ruihong [1 ]
Yang Wei [1 ]
机构
[1] Huanggang Normal Univ, Dept Comp Scinece & Technol, Huanggang 438000, Peoples R China
来源
INNOVATIVE COMPUTING AND INFORMATION, PT II | 2011年 / 232卷
关键词
Wireless Local Area Network; WAI; CK model; Unicast Key; KEY-EXCHANGE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authentication process of wireless local area network authentication and privacy infrastructure, namely, WAI protocol, is researched and analyzed, and the security analysis is made to its the security authentication and key-agreement process by using CK model. The analysis shows that: WAI can realize security attributes such as message integrity, mutual entity authentication, mutual key-control, key confirmation and so on, and it can also statisfy the secure goal of wireless local area network. Thus, it can be used to enhance the security of wireless local area network instead of WEP.
引用
收藏
页码:253 / 258
页数:6
相关论文
共 50 条
  • [41] Security Analysis of an Attractive Online Authentication Standard: FIDO UAF Protocol
    Hu, Kexin
    Zhang, Zhenfeng
    CHINA COMMUNICATIONS, 2016, 13 (12) : 189 - 198
  • [42] Security Analysis of an Attractive Online Authentication Standard:FIDO UAF Protocol
    Kexin Hu
    Zhenfeng Zhang
    中国通信, 2016, 13 (12) : 189 - 198
  • [43] Security analysis of 5G authentication and key agreement protocol
    Jia F.
    Yan Y.
    Yuan K.
    Zhao L.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1260 - 1266
  • [44] Security analysis of 3GPP authentication and key agreement protocol
    Lu F.
    Zheng K.-F.
    Niu X.-X.
    Yang Y.-X.
    Li Z.-X.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (07): : 1768 - 1782
  • [45] Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs
    Moradi, Fereidoun
    Mala, Hamid
    Ladani, Behrouz Tork
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (04) : 2607 - 2621
  • [46] Security analysis and improvement of the efficient password-based authentication protocol
    Kwon, T
    Park, YH
    Lee, HJ
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (01) : 93 - 95
  • [47] Security and Privacy Analysis of Song-Mitchell RFID Authentication Protocol
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1583 - 1596
  • [48] Security analysis of Hsieh-Sun's deniable authentication protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 45 - +
  • [49] An Enhanced Identity Authentication Security Access Control Model Based on 802.1x Protocol
    Chen, Han-Ying
    Liu, Xiao-Li
    FUZZY SYSTEMS AND DATA MINING II, 2016, 293 : 407 - 413
  • [50] New provable security fast authentication protocol
    Zhu, Hui
    Li, Hui
    Pang, Liao-Jun
    Wang, Yu-Min
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (01): : 55 - 58