Computer Science ›› 2011, Vol. 38 ›› Issue (9): 103-107.

Previous Articles     Next Articles

Research on Wireless Security Protocol Design

GU Xiang,ZHANG Zhen, QIU Jian-lin   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Discussed general steps of a wireless security protocol design, including abstracting of application environment, analyzing weakness of application-specific network, confirming objectives of protocol to be designed, analyzing advantages and disadvantages of the existing similar protocols, designing protocol, proofing protocol security. And in accordance with these steps,a new wireless network authentication protocol was designed as an example. Practice shows that these steps could guide the designing of wireless security protocols better. They could also be used to guide the designing of some small application-layer protocols.

Key words: Wireless I,AN, Security protocol, Authentication protocol, Formal technology, Protocol design

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!