By Topic

An efficient authentication protocol of WLAN and its security proof

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Haojun Zhang ; Comput. Eng. dept., Henan Univ. of Technol., Zhengzhou ; Li Chen

The authentication infrastructures of 802.11i and WAPI lack the features of authenticating STAs in the foremost time, and give more opportunities for attackers to launch DoS attacks to consume legal principalsiquest resources on computation and communication. An improved IAKN protocol is presented and its security proof is stated. The analysis shows that it has better security properties and is more efficient than IEEE 802.11i and WAPI. The security properties - session authentication and secret key secrecy - are proved using PCL. The invariants of compositional security guarantees are deduced. The proposed protocol can be securely composed with other protocols when these invariants are protected.

Published in:

Communications and Networking in China, 2008. ChinaCom 2008. Third International Conference on

Date of Conference:

25-27 Aug. 2008