Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 420-424.

Previous Articles     Next Articles

Enhanced WAI Certificate Authentication Process

XIAO Yue-lei, ZHU Zhi-xiang and ZHANG Yong   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Based on the existing WAI certificate authentication process,an enhanced WAI certificate authentication process was proposed.Besides implementing the function of the existing WAI certificate authentication process,it can establish a secure channel between the Station(STA) and the authentication service unit(ASU),and a secure channel between the access point(AP) and the ASU,supporting the platform-authentication of the trusted connect architecture(TCA) well.Moreover,this enhanced WAI certificate authentication process was proved securely by using the strand space model(SSM) and we pointed out backward compatibility with the existing WAI certificate authentication process.

Key words: WAI,Certificate authentication process,Strand space model,Backward compatibility

[1] 黄振海,郭宏,王育民,等.GB15629.11-2003信息远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范[S].北京:中国标准出版社,2003
[2] 宽带无线IP工作组.GB15629.11-2003信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范和GB15629.1102-2003 信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范:2.4GHz频段较高速物理层扩展规范实施指南[EB/OL].[2006-01-10].http://www.chinabwips.org/
[3] 赖晓龙,曹军,铁满霞,等.GB 15629.11-2003/XG1-2006 信息远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单[S].北京:中国标准出版社,2006
[4] Tang Qiang.On the security of three versions of the WAI protocol in Chinese WLAN implementation plan[C]∥Proc of the second International Conference on Communications and Networking in China.Shanghai:ePrint,2007:333-339
[5] 铁满霞,李建东,王育民.WAPI密钥管理协议的PCL证明[J].电子与信息学报,2009,31(2):444-447
[6] Trusted Computing Group.TCG trusted network connect architecture for interoperability specification version 1.4[EB/OL].[2009-05-18].http://www.trustedcomputinggroup.org/
[7] 沈昌祥,肖跃雷,曹军,等.GB/T 29828-2013信息安全技术 可信计算规范 可信连接架构[S].北京:中国标准出版社,2006
[8] ISO/IEC.ISO/IEC 9798-3:1998/Amd.1:2010 Information tech-nology-Security techniques-Entity authentication-Part 3:Mechanisms using digital signature techniques AMENDMENT 1[S].ISO/IEC,2010
[9] Fabrega F J T,Herzog J C,Guttman J D.Strand space:proving security protocols correct[J].Journal of Computer Security,1999,7(2/3):191-230
[10] Herzog J C.The Diffie-Hellman key-agreement scheme in thestrand-space model[C]∥Proc of the 16th IEEE Computer Secu-rity Foundations Workshop.Pacific Grove:IEEE,2003:234-247

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!