JOURNAL OF LIGHT INDUSTRY

CN 41-1437/TS  ISSN 2096-1553

Volume 26 Issue 3
May 2011
Article Contents
WANG Bin and LV Xin-mei. Authentication and key negotiation protocol based on EAP-SAKE in WLAN[J]. Journal of Light Industry, 2011, 26(3): 50-52,62. doi: 10.3969/j.issn.1004-1478.2011.03.013
Citation: WANG Bin and LV Xin-mei. Authentication and key negotiation protocol based on EAP-SAKE in WLAN[J]. Journal of Light Industry, 2011, 26(3): 50-52,62. doi: 10.3969/j.issn.1004-1478.2011.03.013 shu

Authentication and key negotiation protocol based on EAP-SAKE in WLAN

  • Received Date: 2011-05-03
    Available Online: 2011-05-15
  • According to portable communication terminal has limited computation resource and communication ability.Which is difficult to implement key cryptography algorithm with large amount of calculation question.It is proposed an authentication method based on EAP-SAKE in order to solve the problem.It uses some security technologies to provide mutual authentication between peers,such as message integrity code,etc.This authentication method generates different keys for various purposes from root secret and constitutes key hierarchy.In addition,it can resist replay attack and man-in-middle attack.It has less communication load and computing amount and provides key negotiation.So it is more suitable for protecting the information security in mobile terminal which has limited resource in WLAN.
  • 加载中

Article Metrics

Article views(1125) PDF downloads(33) Cited by()

Ralated
    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return