A Correctness Proof of WAPI Certificate Authentication Protocol

被引:2
|
作者
Tie Manxia [1 ]
Li Jiandong
Huang Zhenhai
Wang Yumin
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
来源
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15 | 2007年
关键词
WLAN; WAPI; WAPI certificate authentication protocol; PCL; security proof;
D O I
10.1109/WICOM.2007.576
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
WAPI certificate authentication protocol is the core and key component of WAPI security mechanism proposed by Chinese WLAN standard. This protocol adopts public key cryptographic technique, ASUE and AE implement the mutual identity authentication aided by their trusting third ASE to realize secure access and negotiate the corresponding BK. Using a formal logic of PCL, WAPI certificate authentication protocol is programmed and its security properties are proved. The results show that if all the entities involved in the protocol do not reveal their long-term keys or short-term keys, this protocol provides the properties of strong session authentication and key secrecy and achieves its predefined security goals.
引用
收藏
页码:2310 / +
页数:2
相关论文
共 31 条
  • [1] Security enhancement of WAPI access authentication protocol (WAI)
    刘永磊
    金志刚
    Journal of Harbin Institute of Technology(New series), 2012, (06) : 42 - 46
  • [2] An Efficient Authentication Protocol of WLAN and its Security Proof
    Zhang, Haojun
    Chen, Li
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1076 - +
  • [3] Research on Implementation of Identity Authentication based on WAPI
    Wang, Shewei
    Song, Min
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1168 - 1170
  • [4] Mutual Light-weight Authentication Protocol Base on HB Protocol
    Tian, Jiayun
    Yang, Cheng
    Liu, Jianbo
    INTERNATIONAL SYMPOSIUM ON FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION (FSKDNC 2014), 2014, : 114 - 119
  • [5] SECURE BIDIRECTIONAL LIGHT-WEIGHT AUTHENTICATION PROTOCOL HB PROTOCOL
    Tian, Jia-Yin
    Yang, Cheng
    Zhang, Yi-Chun
    Liu, Jian-Bo
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 509 - 511
  • [6] Introduction and Analysis of an Authentication protocol Based on WLAN
    li, Li
    Yong, Guo
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 8, 2009, : 126 - 130
  • [7] An Authentication Protocol based on EAP-PAX for WLAN
    Wang Bin
    He Lei
    Wu Zhi-hui
    2011 INTERNATIONAL CONFERENCE ON FUTURE SOFTWARE ENGINEERING AND MULTIMEDIA ENGINEERING (FSME 2011), 2011, 7 : 164 - +
  • [8] A password based authentication protocol for access control in WLAN
    Liu, JX
    Tang, BH
    Liu, Y
    Liu, C
    Liu, YA
    International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 1099 - 1102
  • [9] FLAP: An Efficient WLAN Initial Access Authentication Protocol
    Li, Xinghua
    Bao, Fenye
    Li, Shuxin
    Ma, Jianfeng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 488 - 497
  • [10] An efficient authentication protocol for integrating WLAN and cellular networks
    Tseng, YM
    Yang, CC
    Su, JH
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 416 - 420