Computer Science ›› 2011, Vol. 38 ›› Issue (9): 103-107.
Previous Articles Next Articles
GU Xiang,ZHANG Zhen, QIU Jian-lin
Online:
Published:
Abstract: Discussed general steps of a wireless security protocol design, including abstracting of application environment, analyzing weakness of application-specific network, confirming objectives of protocol to be designed, analyzing advantages and disadvantages of the existing similar protocols, designing protocol, proofing protocol security. And in accordance with these steps,a new wireless network authentication protocol was designed as an example. Practice shows that these steps could guide the designing of wireless security protocols better. They could also be used to guide the designing of some small application-layer protocols.
Key words: Wireless I,AN, Security protocol, Authentication protocol, Formal technology, Protocol design
GU Xiang,ZHANG Zhen, QIU Jian-lin. Research on Wireless Security Protocol Design[J].Computer Science, 2011, 38(9): 103-107.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2011/V38/I9/103
Cited