Tie Man-xia, Li Jian-dong, Zhang Bian-ling, Huang Zhen-hai . A Wireless Access Authentication Protocol Suitable for IBSS Networks[J]. Journal of Electronics & Information Technology, 2008, 30(1): 6-9. doi: 10.3724/SP.J.1146.2007.00271
Citation:
Tie Man-xia, Li Jian-dong, Zhang Bian-ling, Huang Zhen-hai . A Wireless Access Authentication Protocol Suitable for IBSS Networks[J]. Journal of Electronics & Information Technology, 2008, 30(1): 6-9. doi: 10.3724/SP.J.1146.2007.00271
Tie Man-xia, Li Jian-dong, Zhang Bian-ling, Huang Zhen-hai . A Wireless Access Authentication Protocol Suitable for IBSS Networks[J]. Journal of Electronics & Information Technology, 2008, 30(1): 6-9. doi: 10.3724/SP.J.1146.2007.00271
Citation:
Tie Man-xia, Li Jian-dong, Zhang Bian-ling, Huang Zhen-hai . A Wireless Access Authentication Protocol Suitable for IBSS Networks[J]. Journal of Electronics & Information Technology, 2008, 30(1): 6-9. doi: 10.3724/SP.J.1146.2007.00271
It is relatively complex for the existing protocols of WAPI and RSNA of WLAN to run in IBSS networks. There are DoS attacks in their key management procedures. In order to resolve these problems, adopting adaptive selection of entity authentication role and redesigning a new key management protocol, a new wireless access authentication protocol more robust, more efficient and more suitable for IBSS networks is presented. With Canetti-Krawczyk model, this new protocol is analyzed in detail. The analysis results show that it is SK-secure in UM if key encryption algorithm is CCA-secure and the key derivation function is pseudo-random. Finally, based on WAPI, the performance comparison between the new protocol and its original one is made.