By Topic

Security analysis of certificate authentication in Chinese WLAN standard

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Song Yubo ; School of Information Science and Engineering, Southeast university SiPailou 2#, Nanjing, Jiangsu Province, China ; Hu Aiqun ; Chen Kaizhi

The WAI (WLAN authentication infrastructure), is the authentication protocol in the Chinese Wireless LAN standard. This protocol, similar as 802.11i, adopts port-based access control and involves three entities in the authentication process. The three entities named in Chinese standard are ASUE (wireless device), AE (access point) and ASE (authentication server). The WAI is composed of a mutual public key certificates authentication and a key-exchange agreement. We analyze the certificate authentication of WAI protocol using a finite-state verification tool and find that the authentication protocol can't resist the denial of service attack. Attackers can forge the messages to produce inconsistent keys in peers. Several amendments are discussed in this papers.

Published in:

2009 International Conference on Advanced Technologies for Communications

Date of Conference:

12-14 Oct. 2009