Font Size: a A A

Research On Authenticated Key Agreement Scheme For WLAN Mesh

Posted on:2012-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y F YiFull Text:PDF
GTID:2178330335967078Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the popularity of wireless networks and applications, people is becoming more and more rely on wireless networks. Especially WLAN Mesh Network is considered as next-generation wireless network, with its higher capacity, rapid deployment, investment and other advantages are gradually becoming the focus of attention. But the open wireless network transmission media, wireless terminal mobility and dynamic network topology, lead to the wireless network more likely to be broken. In the WLAN Mesh network environment, secure access network and build session key safely between entities is the authentication key agreement protocol which should be solved the key problem and secure communication foundation. But design and analysis of authentication and key agreement is very complicated and challenging. Therefore, security protocols formalizing analysis and proof is vital for designed and analyzed of security protocols, DDMP composition theory proposed by A.Datta is the newest theoretical results of protocol design and safety analysis, it includes Protocol Derivation System(PDS) and Protocol Composition Logic(PCL). Focusing on these focal of authentication key agreement, we propose a secure authenticated key agreement scheme based on Protocol Composition Logic. In this paper, we make a more in-depth research on formal design and analysis method of protocol. Firstly formally analyzes the WMEN authenticated key agreement scheme SKE and detects the KCI attack and interleaving attack exists in the protocol. Based on BDH difficult problem, reference mechanism for identity-based key agreement, a novel WMEN security authenticated and key agreement protocol is proposed. Modular correctness and security of the novel protocol are proved by formal design and analysis method. At the same time, the new scheme is analyzed and compared with the related scheme, the new scheme more secure and efficient.
Keywords/Search Tags:WLAN Mesh, Authentication key agreement, Protocol deductive system, Protocol composition logic, WMEN
PDF Full Text Request
Related items