Research of Improved Network Access Authorization Mechanism Based on Elliptic Curve

Article Preview

Abstract:

Currently, the generic WLAN authentication protocols have the problem of low security intensity, or the problem of only one-way identification. It cannot completely adapt to the wireless LAN access certification requirements, under the condition of high security. The article analyzes the disadvantage of WAPI protocol, and then puts forward a kind of improved WLAN access authentication mechanism. It implements the mutual authentication, privacy protection, and also it can resist man-in-the-middle attack and impersonation attack. It fulfills the requirement of wireless terminals security access. The effect on security and efficiency is analyzed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

236-240

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhu yan qiong, Xu hui. Overview of wireless LAN authentication mechanism[J]. computer engineering and design. 2012, 33(1): 96-100.

Google Scholar

[2] Tie man xia, Li jian dong, Wang yu min. Availability analysis and improvements for WAPI [J]. computer science. 2007, 34(10): 84-87.

Google Scholar

[3] Jiang qi, Ma jian feng, Li guang song, et al. Security integration of WAPI based on WLAN and 3G[J]. Chinese journal of computer. 2010, 9: 1675-1685.

DOI: 10.3724/sp.j.1016.2010.01675

Google Scholar

[4] Wang hao, Yang jian, Liu jie, et al. Research on network access authentication and key update mechanism for WIA-PA network[J]. Process automation instrumentation, 2011, 32(7): 6-10.

Google Scholar

[5] Perrig A , Szewezyk R , Tygar J D, et al , SPINS: security protocols for sensor networks[J].Wireless Networks,2002,8(5):521—534.

Google Scholar

[6] Bellare M , Canetti R , Krawezyk H . Keying hash functions for message authentication[J]. Advances in Cryptodagy —Crypto'96,I~vture Notes in Computer Science,1996,1109:1—15.

DOI: 10.1007/3-540-68697-5_1

Google Scholar