首页 | 本学科首页   官方微博 | 高级检索  
     

基于近场通信认证的无线局域网无线接入协议的安全性设计
引用本文:李云,陈庞森,孙山林.基于近场通信认证的无线局域网无线接入协议的安全性设计[J].计算机应用,2016,36(5):1236-1245.
作者姓名:李云  陈庞森  孙山林
作者单位:1. 桂林航天工业学院 电子信息与自动化学院, 广西 桂林 541004;2. 天津大学 电子信息工程学院, 天津 300072;3. 桂林电子科技大学 信息与通信学院, 广西 桂林 541004
基金项目:国家自然科学基金资助项目(61162003);广西自然科学基金资助项目(2015GXNSFAA139298);桂林航天工业学院自然科学基金资助项目(YJ1403)。
摘    要:针对基于近场通信(NFC)认证的无线局域网(WLAN)无线接入协议点对点通信模式存在的问题,如明文传输、用户接入匿名性、数据易于被窃听、易于被篡改等,提出基于NFC认证的WLAN无线接入协议安全性的设计。该协议采用Diffie-Hellman密钥交换算法与第二代安全散列算法(SHA)建立安全隧道来完成随机信息的交换;采用椭圆曲线数字签名算法来消除用户的匿名性。从协议需求分析、架构设计与协议时序步骤三个方面入手,给出了一个计算机上的原型实现。通过有色Petri网(CPN)建模,实验仿真结果表明:基于NFC认证的WLAN接入协议对于无线局域网的非法接入攻击与窃听攻击有着良好的抵抗效果。

关 键 词:近场通信  无线局域网  有色Petri网  椭圆曲线数字签名算法  
收稿时间:2015-09-23
修稿时间:2015-11-10

Security analysis and implementation for wireless local area network access protocol via near field communication authentication
LI Yun,CHEN Pangsen,SUN Shanlin.Security analysis and implementation for wireless local area network access protocol via near field communication authentication[J].journal of Computer Applications,2016,36(5):1236-1245.
Authors:LI Yun  CHEN Pangsen  SUN Shanlin
Affiliation:1. College of Electronic Information and Automation, Guilin University of Aerospace Technology, Guilin Guangxi 541004, China;2. College of Electronic Information Engineering, Tianjin University, Tianjin 300072, China;3. College of Information and Communication, Guilin University of Electronic Technology, Guilin Guangxi 541004, China
Abstract:Aiming at the problems existing in point-to-point communication model of Wireless Local Area Network (WLAN) protocol via Near Field Communication (NFC) authentication, such as plaintext transferring, user's anonymous access, data being easily tapped and tampered, a security design of WLAN protocol via NFC was put forward. The security tunnel was built using Diffie-Hellman key exchange algorithm and second generation Secure Hash Algorithm (SHA) to transfer the random information, and the user's anonymity was eliminated using Elliptic Curve Digital Signature Algorithm (ECDSA). A prototype implementation on computer was given from requirement analysis, architecture design and sequence steps of the protocol. The experimental results by using Colored Petri Net (CPN) modeling show that the proposed protocol can execute stably and deal with the unauthorized access and eavesdropping problems of WLAN.
Keywords:Near Field Communication (NFC)                                                                                                                        Wireless Local Area Network (WLAN)                                                                                                                        Colored Petri Net (CPN)                                                                                                                        Elliptic Curve Digital Signature Algorithm (ECDSA)
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号