Improved multicast key management of Chinese wireless local area network security standard

被引:15
作者
Pang, L. [1 ,2 ]
Li, H. [3 ]
Pei, Q. [2 ]
机构
[1] Xidian Univ, Sch Life Sci & Technol, Xian 710071, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[3] Northwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710072, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
PROTOCOL; EXCHANGE;
D O I
10.1049/iet-com.2010.0954
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Multicasting is an important business in the field of the wireless local area network (WLAN), because the access point (AP) usually has to send the same message to each station (STA) of a specific group, and broadcasting the message to this group is one of the most efficient ways of communication. Chinese WLAN security standard, called WLAN Authentication and Privacy Infrastructure (WAPI), has taken secure multicasting into account, and proposed a Multicast Key Management Protocol (MKMP), in which the multicast session key (MSK) is distributed to each STA over the secure unicast channel built between STA and AP one by one. It is clear that the MSK distribution is very inefficient in performance, especially when the number of STAs is very large. In this study, a new MSK distribution protocol is proposed, and it can be used to substitute the original protocol in WAPI. Analyses show that the proposed protocol can achieve needed security requirements, and is more efficient than the original one in WAPI. Now, WAPI has been in the process of ISO/IEC standard building, and thus the authors think that their proposal can ameliorate WAPI largely and promote its ISO/IEC standard building.
引用
收藏
页码:1126 / 1130
页数:5
相关论文
共 19 条
  • [1] [Anonymous], 2006, WIRELESS AUTHENTICAT
  • [2] [Anonymous], 2003, WIRELESS AUTHENTICAT
  • [3] [Anonymous], 2001, P 7 ANN INT C MOB CO
  • [4] Your 802.11 wireless network has no clothes
    Arbaugh, WA
    Shankar, N
    Wan, YCJ
    Zhang, K
    [J]. IEEE WIRELESS COMMUNICATIONS, 2002, 9 (06): : 44 - 51
  • [5] Baek J, 2005, LECT NOTES COMPUT SC, V3386, P380
  • [6] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
  • [7] Chang LP, 2010, J INTERNET TECHNOL, V11, P519
  • [8] A survey of key distribution in wireless sensor networks
    Chen, Chi-Yuan
    Chao, Han-Chieh
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2495 - 2508
  • [9] IEEE 802.11 wireless local area networks
    Crow, BP
    Widjaja, I
    Kim, JG
    Sakai, PT
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1997, 35 (09) : 116 - 126
  • [10] Huixian Li, 2008, 2008 International Conference on Computational Intelligence and Security, P419, DOI 10.1109/CIS.2008.54