An Efficient Authentication Protocol of WLAN and its Security Proof

被引:0
|
作者
Zhang, Haojun [1 ]
Chen, Li [2 ]
机构
[1] Henan Univ Technol, Dept Comp Engn, Zhengzhou 450000, Peoples R China
[2] Henan Univ Finance & Econ, Modern Educ Technol Ctr, Zhengzhou, Peoples R China
关键词
WLAN; Authentication; WAPI; 802.11i; PCL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The authentication infrastructures of 802.11i and WAPI lack the features of authenticating STAs in the foremost time, and give more opportunities for attackers to launch DoS attacks to consume legal principals' resources on computation and communication. An improved IAKN protocol is presented and its security proof is stated. The analysis shows that it has better security properties and is more efficient than IEEE 802.11i and WAPI. The security properties - session authentication and secret key secrecy - are proved using PCL. The invariants of compositional security guarantees are deduced. The proposed protocol can be securely composed with other protocols when these invariants are protected.
引用
收藏
页码:1076 / +
页数:3
相关论文
共 50 条
  • [1] An Efficient WLAN Initial Access Authentication Protocol
    Li, Xinghua
    Ma, Jianfeng
    Shen Yulong
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1035 - 1040
  • [2] An efficient authentication protocol for integrating WLAN and cellular networks
    Tseng, YM
    Yang, CC
    Su, JH
    [J]. 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 416 - 420
  • [3] FLAP: An Efficient WLAN Initial Access Authentication Protocol
    Li, Xinghua
    Bao, Fenye
    Li, Shuxin
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 488 - 497
  • [4] An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment
    Ma, Zhuo
    Ma, Jianfeng
    Moon, SangJae
    Li, Xinghua
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 430 - 437
  • [5] A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
    Jiang, Xin
    Liu, Mingzhe
    Yang, Chen
    Liu, Yanhua
    Wane, Ruili
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (01): : 45 - 59
  • [6] An Efficient Semi-Quantum Key Distribution Protocol and Its Security Proof
    Ye Chongqiang
    Li Jian
    Chen Xiubo
    Tian Yuan
    Hou Yanyan
    [J]. IEEE COMMUNICATIONS LETTERS, 2022, 26 (06) : 1226 - 1230
  • [7] An efficient authentication protocol with anonymity for 3G/WLAN interworking
    Chien, Hung-Yu
    Teng, Hung-Yi
    Chen, Yen-Cheng
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (01): : 15 - 24
  • [8] A fast and efficient authentication protocol for a seamless handover between a WLAN and WiBro
    Lim, Sun-Hee
    Yi, Okyeon
    Jung, Chang-Hoon
    Bang, Ki-Seok
    [J]. 2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 953 - +
  • [9] Efficient Security Authentication Protocol in Wireless Sensor Networks
    Latha, S. Asha
    Sivabalan, A.
    [J]. ADVANCEMENTS IN AUTOMATION AND CONTROL TECHNOLOGIES, 2014, 573 : 418 - +
  • [10] Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems
    Sun, Da-Zhi
    Mu, Yi
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (02) : 254 - 257