WAPI-XG1 access and fast switch authentication method

A technology of WAPI-XG1, authentication method, applied in the field of WAPI-XG1 access and fast handover authentication, can solve the problems of inability to access the network, different, lack of error recovery mechanism, etc., to achieve the effect of reducing complexity

Inactive Publication Date: 2009-04-29
TIANJIN POLYTECHNIC UNIV +1
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] The shortcoming of the prior art 1 is: the security association in the fast handover is a very important problem in WLAN, and it is also a problem that needs to be solved urgently
[0036] The shortcoming of prior art two is: (1) IEEE 802.11i and 11r and WAPI are completely different security standards
Therefore 11i and 11r cannot be used to solve the problem in WAPI
(2) The four-step handshake protocol cannot guarantee forward secrecy
For the active attacker, the consequences are more serious, because the loss of the long-term key means that the entity is completely compromised, and the active attacker can forge and tamper with all the data between the STA and the AP
(3) The efficiency of authentication and key agreement is poor
(4) Lack of effective user identity protection mechanism
(5) IEEE 802.11i and 11r still have some other problems, such as the security of management frames, DoS attacks in four-step handshake, and the lack of error recovery mechanisms, etc.
[0063] The shortcoming of prior art three is: (1) this scheme and WAPI are completely different security schemes
Therefore, it cannot be used to solve the problems existing in WAPI-XG1
(2) The pre-authenticatio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WAPI-XG1 access and fast switch authentication method
  • WAPI-XG1 access and fast switch authentication method
  • WAPI-XG1 access and fast switch authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0140] Such as Figure 9 As shown, the access authentication method WAPI-XG1 of the present invention + Mutual authentication between STA, AP, and ASU is realized through a protocol interaction. Since there is no direct trust relationship between STA and AP, a trusted third-party ASU is required to confirm and transmit authentication information to achieve mutual trust. For the certificate-based authentication mode, the protocol performs two different DH key exchanges between STA and AP, STA and ASU, which are used to generate the shared key USK between STA and AP, and the shared key USK between STA and ASU. Shared key HK. For the PSK-based authentication mode, the protocol also implements explicit key authentication between STA and AP and between STA and ASU. Therefore, after a STA accesses a WLAN through the new authentication protocol, it is no longer necessary to conduct a communication between the STA and the AP. The explicit key authentication based on the shared key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method used for authentificating the access and quick switching over of WAPI-XG1, belonging to the field of wireless communication. The method comprises the steps as follows: an authentication protocol is accessed and used for establishing a connection between an STA and a first AP, the session key with the first AP is established, and keys used for quick switching over with an ASU are established; when the STA moves to the control domain of a second AP, a safety correlation establishing protocol and a unicall session key updating protocol under quick switching over are carried out. The method can solve the problems that the WAPI-XG1 can not support the quick switching over and the forward secrecy can not be ensured and the offline dictionary attack can not be resisted under a pre-shared key authentication mode; meanwhile, the method needs not change the authentication framework of the WAPI-XG1needs not changing, the two authentication modes based on the certificate and shared key are integrated into one authentication proposal; furthermore, when the switching over occurs on the client terminal, only the quick switching over safety correlation establishment protocol runs with the destination access point for the authentication mode based on the certificate, without re-authentication or pre-authentication.

Description

technical field [0001] The invention belongs to the field of wireless communication, and in particular relates to a WAPI-XG1 access and fast switching authentication method. Background technique [0002] China's first national standard GB 15629.11-2003 in the field of Wireless Local Area Network (WLAN) was officially implemented on November 1, 2003, and the security solution in it is called WLAN Authentication and Privacy Infrastructure (WAPI). In March 2004, the National Broadband Wireless IP Standard Working Group (BWIPS) of the China IT Standardization Technical Committee released the implementation plan of WAPI, which corrected some security defects of the original national standard WAPI. Considering the coexistence of different WLAN security solutions (such as IEEE 802.11i), Lai Xiaolong and others proposed a new WLAN security solution on the basis of WAPI and its implementation, and it was approved by China Broadband Wireless IP on July 31, 2006. The standard working ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04L29/06H04W36/00H04W12/0433H04W12/069
CPCH04W84/12H04W12/069
Inventor 马建峰曹春杰杨超刘文菊王赜柯永振时珍全张艳
Owner TIANJIN POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products