An Efficient Authentication Protocol of WLAN and its Security Proof

被引:0
|
作者
Zhang, Haojun [1 ]
Chen, Li [2 ]
机构
[1] Henan Univ Technol, Dept Comp Engn, Zhengzhou 450000, Peoples R China
[2] Henan Univ Finance & Econ, Modern Educ Technol Ctr, Zhengzhou, Peoples R China
关键词
WLAN; Authentication; WAPI; 802.11i; PCL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The authentication infrastructures of 802.11i and WAPI lack the features of authenticating STAs in the foremost time, and give more opportunities for attackers to launch DoS attacks to consume legal principals' resources on computation and communication. An improved IAKN protocol is presented and its security proof is stated. The analysis shows that it has better security properties and is more efficient than IEEE 802.11i and WAPI. The security properties - session authentication and secret key secrecy - are proved using PCL. The invariants of compositional security guarantees are deduced. The proposed protocol can be securely composed with other protocols when these invariants are protected.
引用
收藏
页码:1076 / +
页数:3
相关论文
共 50 条
  • [41] Re-authentication Protocol from WLAN to LTE (ReP WLAN-LTE)
    Othmen, Salwa
    Zarai, Faouzi
    Obaidat, Mohammad S.
    Belghith, Aymen
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 1446 - 1451
  • [42] On the security of the authentication module of Chinese WLAN standard implementation plan
    Li, Xinghua
    Moon, SangJae
    Ma, Jianfeng
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 340 - 348
  • [43] A directed graph-based authentication protocol model and its security analysis
    Xie Hong-bo
    Wu Yuan-chen
    Zhou Ming-tian
    FCST 2006: JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2006, : 89 - +
  • [44] Security analysis of practical anonymous user authentication scheme with security proof
    Liu, Chenglian
    Lin, Changlu
    Sun, Shuliang
    Information Technology Journal, 2013, 12 (03) : 522 - 525
  • [45] Compact Extensible Authentication Protocol for the Internet of Things: Enabling Scalable and Efficient Security Commissioning
    Pawlowski, Marcin Piotr
    Jara, Antonio J.
    Ogorzalek, Maciej J.
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [46] An efficient identity authentication protocol for layer 2 security sourced on ECC for IoT communications
    Hussain, Iqra
    Pandey, Nitin
    Negi, Mukesh Chandra
    Test Engineering and Management, 2019, 81 (11-12): : 1799 - 1810
  • [47] A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN
    Tran, Bao Ngoc
    Nguyen, Thuc Dinh
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 229 - 234
  • [48] A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
    Kolesnikov, Vladimir
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 235 - 252
  • [49] Efficient quantum key distribution scheme and a proof of its unconditional security
    Lo, HK
    Chau, HF
    Ardehali, M
    JOURNAL OF CRYPTOLOGY, 2005, 18 (02) : 133 - 165
  • [50] Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
    Hoi-Kwong Lo
    H.F. Chau
    M. Ardehali
    Journal of Cryptology, 2005, 18 : 133 - 165