An Efficient Authentication Protocol of WLAN and its Security Proof

被引:0
|
作者
Zhang, Haojun [1 ]
Chen, Li [2 ]
机构
[1] Henan Univ Technol, Dept Comp Engn, Zhengzhou 450000, Peoples R China
[2] Henan Univ Finance & Econ, Modern Educ Technol Ctr, Zhengzhou, Peoples R China
来源
2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3 | 2008年
关键词
WLAN; Authentication; WAPI; 802.11i; PCL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The authentication infrastructures of 802.11i and WAPI lack the features of authenticating STAs in the foremost time, and give more opportunities for attackers to launch DoS attacks to consume legal principals' resources on computation and communication. An improved IAKN protocol is presented and its security proof is stated. The analysis shows that it has better security properties and is more efficient than IEEE 802.11i and WAPI. The security properties - session authentication and secret key secrecy - are proved using PCL. The invariants of compositional security guarantees are deduced. The proposed protocol can be securely composed with other protocols when these invariants are protected.
引用
收藏
页码:1076 / +
页数:3
相关论文
共 50 条
  • [1] FLAP: An Efficient WLAN Initial Access Authentication Protocol
    Li, Xinghua
    Bao, Fenye
    Li, Shuxin
    Ma, Jianfeng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 488 - 497
  • [2] An efficient authentication protocol for integrating WLAN and cellular networks
    Tseng, YM
    Yang, CC
    Su, JH
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 416 - 420
  • [3] A Correctness Proof of WAPI Certificate Authentication Protocol
    Tie Manxia
    Li Jiandong
    Huang Zhenhai
    Wang Yumin
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2310 - +
  • [4] Security analysis of the authentication modules of chinese WLAN standard and its implementation plan
    Li, Xinghua
    Ma, Jianfeng
    Moon, SangJae
    NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2007, 4672 : 306 - +
  • [5] An efficient authentication protocol with anonymity for 3G/WLAN interworking
    Chien, Hung-Yu
    Teng, Hung-Yi
    Chen, Yen-Cheng
    JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (01): : 15 - 24
  • [6] A fast and efficient authentication protocol for a seamless handover between a WLAN and WiBro
    Lim, Sun-Hee
    Yi, Okyeon
    Jung, Chang-Hoon
    Bang, Ki-Seok
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 953 - +
  • [7] Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems
    Sun, Da-Zhi
    Mu, Yi
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (02) : 254 - 257
  • [8] Re-authentication Protocol from WLAN to LTE (ReP WLAN-LTE)
    Othmen, Salwa
    Zarai, Faouzi
    Obaidat, Mohammad S.
    Belghith, Aymen
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 1446 - 1451
  • [9] An efficient authentication infrastructure of WLAN based on self-updating hash chain
    Zhang, Haojun
    Chen, Li
    Zhu, Yuefei
    CHINA COMMUNICATIONS, 2007, 4 (01) : 66 - 74
  • [10] An Efficient Authentication Infrastructure of WLAN Based on Self-Updating Hash Chain
    Haojun Zhang~1
    中国通信, 2007, 4 (01) : 66 - 74