A Correctness Proof of WAPI Certificate Authentication Protocol

被引:2
|
作者
Tie Manxia [1 ]
Li Jiandong
Huang Zhenhai
Wang Yumin
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
来源
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15 | 2007年
关键词
WLAN; WAPI; WAPI certificate authentication protocol; PCL; security proof;
D O I
10.1109/WICOM.2007.576
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
WAPI certificate authentication protocol is the core and key component of WAPI security mechanism proposed by Chinese WLAN standard. This protocol adopts public key cryptographic technique, ASUE and AE implement the mutual identity authentication aided by their trusting third ASE to realize secure access and negotiate the corresponding BK. Using a formal logic of PCL, WAPI certificate authentication protocol is programmed and its security properties are proved. The results show that if all the entities involved in the protocol do not reveal their long-term keys or short-term keys, this protocol provides the properties of strong session authentication and key secrecy and achieves its predefined security goals.
引用
收藏
页码:2310 / +
页数:2
相关论文
共 31 条
  • [21] A secure n-secret based client authentication protocol for 802.11 WLANs
    Kumar, Pawan
    Kumar, Dinesh
    TELECOMMUNICATION SYSTEMS, 2020, 75 (03) : 259 - 271
  • [22] Re-authentication Protocol from WLAN to LTE (ReP WLAN-LTE)
    Othmen, Salwa
    Zarai, Faouzi
    Obaidat, Mohammad S.
    Belghith, Aymen
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 1446 - 1451
  • [23] Proving Mutual Authentication Property of 5G-AKA Protocol Based on PCL
    Zhang, Tong
    Xiao, Meihua
    Ouyang, Ri
    THEORETICAL COMPUTER SCIENCE, NCTCS 2021, 2021, 1494 : 222 - 233
  • [24] Roaming across wireless local area networks using SIM-based authentication protocol
    Tsai, Hao-Chuan
    Chang, Chin-Chen
    Chang, Kai-Jie
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 381 - 389
  • [25] USIM-based EAP-TLS authentication protocol for wireless local area networks
    Tseng, Yuh-Min
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 128 - 136
  • [26] Enhancing WP A2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack A novel re-authentication protocol
    Ghanem, Mohamed Chahine
    Ratnayake, Deepthi N.
    2016 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2016,
  • [27] A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network
    Chou-Chen Yang
    Ya-Wen Yang
    Wei-Ting Liu
    Wireless Personal Communications, 2006, 39 : 229 - 251
  • [28] Research on authentication security of wireless local area network based on L2TP protocol
    Niu Yan
    Li Jun
    Li Lala
    2009 IITA INTERNATIONAL CONFERENCE ON SERVICES SCIENCE, MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 491 - 494
  • [29] A robust authentication protocol with non-repudiation service for integrating WLAN and 3G network
    Yang, Chou-Chen
    Yang, Ya-Wen
    Liu, Wei-Ting
    WIRELESS PERSONAL COMMUNICATIONS, 2006, 39 (02) : 229 - 251
  • [30] Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard
    Ghilen, Aymen
    Azizi, Mostafa
    Bouallegue, Ridha
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,