Please submit manuscripts in either of the following two submission systems

    ScholarOne Manuscripts

  • ScholarOne
  • 勤云稿件系统

  • 登录

Search by Issue

  • 2024 Vol.31
  • 2023 Vol.30
  • 2022 Vol.29
  • 2021 Vol.28
  • 2020 Vol.27
  • 2019 Vol.26
  • 2018 Vol.25
  • 2017 Vol.24
  • 2016 vol.23
  • 2015 vol.22
  • 2014 vol.21
  • 2013 vol.20
  • 2012 vol.19
  • 2011 vol.18
  • 2010 vol.17
  • 2009 vol.16
  • No.1
  • No.2

Supervised by Ministry of Industry and Information Technology of The People's Republic of China Sponsored by Harbin Institute of Technology Editor-in-chief Yu Zhou ISSNISSN 1005-9113 CNCN 23-1378/T

期刊网站二维码
微信公众号二维码
Related citation:LIU Yong-lei,JIN Zhi-gang.Security enhancement of WAPI access authentication protocol (WAI)[J].Journal of Harbin Institute Of Technology(New Series),2012,19(6):42-46.DOI:10.11916/j.issn.1005-9113.2012.06.008.
【Print】   【HTML】   【PDF download】   View/Add Comment  Download reader   Close
←Previous|Next→ Back Issue    Advanced Search
This paper has been: browsed 1686times   downloaded 1052times 本文二维码信息
码上扫一扫!
Shared by: Wechat More
Security enhancement of WAPI access authentication protocol (WAI)
Author NameAffiliation
LIU Yong-lei School of Computer Science and Technology,Tianjin University,Tianjin 300072,China
School of Computer and Information of Urban Construction,Tianjin 300384,China 
JIN Zhi-gang School of Electronic and Information Engineering,Tianjin University,Tianjin 300072,China 
Abstract:
In this paper, the current known attack methods against WAI and the improvements of WAI called WAI’ were analyzed. Through analyzing the unicast key agreement protocol in the WAI’ by CPN model, the vulnerabilities of WAI’ were found out. The improvement of WAI’ was made and a new protocol called WAI’-E was proposed. The WAI’-E was combined with the key exchange mechanism of Diffie-Hellman based on elliptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI’-E was SK-secure with PFS and was provided with independent security of certificate authentication was proved.
Key words:  WLAN  WLAN Authentication and Privacy Infrastructure  Colored Petri Nets  CK model
DOI:10.11916/j.issn.1005-9113.2012.06.008
Clc Number:TP393
Fund:

LINKS