• DocumentCode
    3525271
  • Title

    An efficient authentication protocol of WLAN and its security proof

  • Author

    Zhang, Haojun ; Chen, Li

  • Author_Institution
    Comput. Eng. dept., Henan Univ. of Technol., Zhengzhou
  • fYear
    2008
  • fDate
    25-27 Aug. 2008
  • Firstpage
    1133
  • Lastpage
    1137
  • Abstract
    The authentication infrastructures of 802.11i and WAPI lack the features of authenticating STAs in the foremost time, and give more opportunities for attackers to launch DoS attacks to consume legal principalsiquest resources on computation and communication. An improved IAKN protocol is presented and its security proof is stated. The analysis shows that it has better security properties and is more efficient than IEEE 802.11i and WAPI. The security properties - session authentication and secret key secrecy - are proved using PCL. The invariants of compositional security guarantees are deduced. The proposed protocol can be securely composed with other protocols when these invariants are protected.
  • Keywords
    authorisation; protocols; wireless LAN; DoS attack; PCL; WLAN; authentication infrastructures; authentication protocol; protocol composition logic; secret key secrecy; security proof; session authentication; Access protocols; Authentication; Computer crime; Computer security; Law; Legal factors; Microwave integrated circuits; Modems; Protection; Wireless LAN; 802.11i; Authentication; PCL; WAPI; WLAN;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Networking in China, 2008. ChinaCom 2008. Third International Conference on
  • Conference_Location
    Hangzhou
  • Print_ISBN
    978-1-4244-2373-6
  • Electronic_ISBN
    978-1-4244-2374-3
  • Type

    conf

  • DOI
    10.1109/CHINACOM.2008.4685226
  • Filename
    4685226