WANG Bin and LV Xin-mei. Authentication and key negotiation protocol based on EAP-SAKE in WLAN[J]. Journal of Light Industry, 2011, 26(3): 50-52,62. doi: 10.3969/j.issn.1004-1478.2011.03.013
Citation:
WANG Bin and LV Xin-mei. Authentication and key negotiation protocol based on EAP-SAKE in WLAN[J]. Journal of Light Industry, 2011, 26(3): 50-52,62.
doi:
10.3969/j.issn.1004-1478.2011.03.013
Authentication and key negotiation protocol based on EAP-SAKE in WLAN
-
Personnel Dept., Zhengzhou Univ. of Light Ind., Zhengzhou 450002, China;
-
Occupation-directing Center, Zhongzhou Univ., Zhengzhou 450044, China
-
Received Date:
2011-05-03
Available Online:
2011-05-15
-
Abstract
According to portable communication terminal has limited computation resource and communication ability.Which is difficult to implement key cryptography algorithm with large amount of calculation question.It is proposed an authentication method based on EAP-SAKE in order to solve the problem.It uses some security technologies to provide mutual authentication between peers,such as message integrity code,etc.This authentication method generates different keys for various purposes from root secret and constitutes key hierarchy.In addition,it can resist replay attack and man-in-middle attack.It has less communication load and computing amount and provides key negotiation.So it is more suitable for protecting the information security in mobile terminal which has limited resource in WLAN.
-
-
References
-
Proportional views
-
-