高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

协议组合逻辑安全的WiMAX无线网络认证协议

冯涛 张子彬 马建峰

冯涛, 张子彬, 马建峰. 协议组合逻辑安全的WiMAX无线网络认证协议[J]. 电子与信息学报, 2010, 32(9): 2106-2111. doi: 10.3724/SP.J.1146.2009.01191
引用本文: 冯涛, 张子彬, 马建峰. 协议组合逻辑安全的WiMAX无线网络认证协议[J]. 电子与信息学报, 2010, 32(9): 2106-2111. doi: 10.3724/SP.J.1146.2009.01191
Feng Tao, Zhang Zi-Bin, Ma Jian-Feng. Security Authentication Protocol for WiMAX Wireless Network Based on Protocol Composition Logic[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2106-2111. doi: 10.3724/SP.J.1146.2009.01191
Citation: Feng Tao, Zhang Zi-Bin, Ma Jian-Feng. Security Authentication Protocol for WiMAX Wireless Network Based on Protocol Composition Logic[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2106-2111. doi: 10.3724/SP.J.1146.2009.01191

协议组合逻辑安全的WiMAX无线网络认证协议

doi: 10.3724/SP.J.1146.2009.01191
基金项目: 

国家高技术研究发展计划(863)(2007AA01Z429),国家自然科学基金(60702059,60972078),甘肃省自然科学基金(2007GS04823),网络安全与密码技术福建省高校重点实验室开放课题(09A006)和兰州理工大学博士基金(BS14200901)资助课题

Security Authentication Protocol for WiMAX Wireless Network Based on Protocol Composition Logic

  • 摘要: 国际标准IEEE 802.16e-2005中PKMv2协议的安全性是WiMAX无线网络安全的重要保证。论文基于协议组合逻辑(PCL)分析了PKMv2协议中认证协议的安全性,发现PKMv2安全认证协议存在交错攻击,在此基础上基于协议演绎系统(PDS)提出了一种新的WiMAX无线网络安全认证协议,并使用协议组合逻辑(PCL)给出新协议的模块化正确性和安全性证明,新协议相对于PKMv2安全认证协议更加安全,更适应WiMAX无线网络复杂的网络应用环境。
  • [1] Yarali A and Rahman S. WiMAX broadband wireless access technology: Services, architecture and deployment models [C]. Electrical and Computer Engineering, 2008. CCECE 2008, Canada, 2008: 77-82. [2] [2] IEEE 802.16e-2005. Air interface for fixed broadband wireless access systems, Amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands[S], NJ, USA, IEEE Press, 2006. Kim Dongmyoung, Cai Hua, and Na Minsoo, et al.. Performance measurement over Mobile WiMAX/IEEE 802.16e network[C], 2008 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, Newport Beach, CA, United states, 2008: 1-8. Agrawal Dharma P, Gossain Hrishikesh, and Cavalcanti Dave, et al.. Recent advances and evolution of WLAN and WMAN standards[C]. IEEE Wireless Communications, USA, 2008: 54-55. [3] Johnston D and Walker J. Mutual authentication for PKMv2, IEEE C802.16e-04_229rl. 2004. [4] Liu Fu-qiang and Lu Lei. A WPKI-Based security mechanism for IEEE 802.16e[C]. WiCOM International Conference, Wuhan, 2006: 1-4. [5] Sun Hung-min, Lin Yue-hsun, and Chen Shuai-min, et al.. Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks[C]. 2007 IEEE Region 10 Conference, Taipei, 2007: 1-4. [6] Shon Taeshik and Choi Wook. An analysis of mobile WiMAX security: vulnerabilities and solutions [J].Lecture Notes in Computer Science.2007, 4658:88-97 [7] Xu Sen and Huang Chin-tser. Attacks on PKM protocols of IEEE 802.16 and its later versions[C]. Proceedings of 3rd International Symposium on Wireless Communication System (ISWCS 2006), Valencia, 2006: 185-189. [8] Datta A. Security analysis of network protocols: compositional reasoning and complexity-theoretic Foundations[D]. [Ph.D. dissertation], Computer Science Department, Stanford University, 2005. [9] Datta A, Derek A, and Mitchell J C, et al.. Protocol Composition Logic (PCL)[J].Electronic Notes in Theoretical Computer Science.2007, 172:311-358 [10] Cremers C. On the protocol composition logic PCL[C]. Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, 2008: 66-76. Doug K, Ryan M, and Tony B, et al.. A correctness proof of a mesh security architecture[C]. Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium, 2008: 315-330. [11] Johnston D and Walker J. Overview of IEEE 80216 security[J].. IEEE Security Privacy.2004, 2:40-48 [12] He Chang-hua, Sundararajan M, and Datta A, et al.. A modular correctness proof of IEEE 802.11i and TLS[C], Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), Alexandria, VA, USA, 2005: 2-15. [13] 铁满霞, 李建东, 王育民. WAPI密钥管理协议的PCL证明[J].电子与信息学报.2009, 31(2):444-447浏览 Tie Man-xia, Li Jian-dong, and Wang Yu-min. A correctness proof of WAPI key management protocol based on PCL[J].Journal of Electronics Information Technology.2009, 31(2):444-447 [14] Meadows C and Pavlovic D. Deriving, attacking and defending the GDOI protocol[C]. Proceedings of 9th European Symposium On Research in Computer Security, France, 2004: 53-72. [15] Lowe G. Some new attacks upon security protocols[C]. Computer Security Foundations Workshop, 1996, Proceedings, 9th IEEE, Kenmare, Ireland, 1996: 10-12.
  • 加载中
计量
  • 文章访问数:  3710
  • HTML全文浏览量:  106
  • PDF下载量:  761
  • 被引次数: 0
出版历程
  • 收稿日期:  2009-09-08
  • 修回日期:  2010-02-09
  • 刊出日期:  2010-09-19

目录

    /

    返回文章
    返回