论文部分内容阅读
Two standards for security of WLAN,IEEE 802.11 i and WAPI,are introduced,and some shortcomings of them are pointed out.Based on hash chains technique to construct identity authentication tokens, a new authentication infrastructure for WLAN is proposed,in which AS authenticates the main entities -STAs in the foremost time.Properties of the proposed scheme are discussed,including security, efficiency and feasibility etc.Compared with 802. 11 i and WAPI,the proposed scheme not only improves efficiency by reducing cost on computation and communication,but also promotes security property -availability by mitigating DoS attacks to AP and AS.At the same time,a self-updating hash chain technique is presented that is embedded in the proposed infrastructure to solve the length limitation of traditional hash chain.
Two standards for security of WLAN, IEEE 802.11 i and WAPI, are introduced, and some shortcomings of them are pointed out. Based on hash chains technique to construct identity authentication tokens, a new authentication infrastructure for WLAN is proposed, in which AS authenticates the main entities-STAs in the foremost time. Properties of the proposed schemes are discussed, including security, efficiency and feasibility etc.Compared with 802. 11 i and WAPI, the proposed scheme not only improves efficiency by reducing cost on computation and communication, but also promotes security property -availability by mitigating DoS attacks to AP and AS. At the same time, a self-updating hash chain technique is presented that that is embedded in the proposed infrastructure to solve the length limitation of traditional hash chain.