期刊文献+

无线局域网WPS安全性分析 被引量:6

Security analysis of WPS in WLAN
在线阅读 下载PDF
导出
摘要 介绍了Wi-Fi联盟的WPS标准并给出了对应的攻击方法——暴力破解攻击,使用CPN对WPS协议及改进协议进行形式化分析并证明AP限制重新发起连接认证的次数为3次时,原协议可完全被攻破而给出的改进协议成功概率仅约为3/108。 In this paper, an overview of Wi-Fi Protected Setup (WPS) is supplied. A brute force attack is pointed out. Using Colored Petri Nets(CPN), the WPS protocol and the improvement are modeled and it is proven that the security flaws exist and the brute force attack is available. Moreover, under setting retry times of connection authentication to be three times, the original protocol can be completely breached and the success breach probability of the improved protocol is only about 3/108.
出处 《计算机工程与应用》 CSCD 2013年第21期87-89,105,共4页 Computer Engineering and Applications
基金 天津大学自主创新基金资助
关键词 无线局域网 Wi—Fi受保护安装 暴力破解 着色PETRI网 个人识别码 协议形式化分析 Wireless Local Area Network(WLAN) Wi-Fi protected setup brute force colored Petri nets personal identification number protocol formal analysis
  • 相关文献

参考文献8

  • 1Wi-Fi Alliance.Wi-Fi protected setup specification version 1.0[S].2007.
  • 2Aboba B,Blunk L,Vollbrecht J,et al.RFC 3748 ExtensibleAuthentication Protocol(EAP)[S/OL].[2011-ll-10].http;//tools.ietf.org/html/rfc3748.
  • 3Nyberg K.Connect now to MitM[EB/OL].[2011-11-10].http://www.tcs.hut.fi/Publications/knyberg/crypto06_rump.pdf.
  • 4Jensen K.Colored Petri nets:basic concepts,analysis methodsand practical use,volume I[M]//Monographs in TheoreticalComputer Science.[S.I.]:Springer-VerIag,1992.
  • 5王文化,沈庆国,韩春永,王滨,戴三明.基于染色Petri网的BGP连接过程模型[J].计算机工程,2011,37(6):82-84. 被引量:2
  • 6孙涛,叶新铭,刘靖,杨蒙.一种基于CPN的协议测试序列生成方法[J].解放军理工大学学报(自然科学版),2012,13(2):165-170. 被引量:6
  • 7朱俊,郭长国,吴泉源.一种基于CPN的运行时监控服务交互行为的方法[J].计算机研究与发展,2011,48(12):2277-2289. 被引量:5
  • 8Aly S,Mustafa K.Protocol verification and analysis using col-ored Petri nets[EB/OL].[2011-11-1 OJ.http://facweb.cs.depaul.edu/research/techreports/tr04-003.pdf.

二级参考文献33

  • 1廖军,谭浩,刘锦德.基于Pi-演算的Web服务组合的描述和验证[J].计算机学报,2005,28(4):635-643. 被引量:107
  • 2CPN Group. CPN Tools[EB/OL]. (2009-05-12). http://wiki.daimi. au.dk/cpntools/cpntools.
  • 3Rekhter Y, Li T. A Border Gateway Protocol[S]. RFC 1771, 1995.
  • 4Jensen K. An Introduction to the Theoretical Aspects of Colored Petri Ncts[C]//Lecmrc Notes in Computer Science. [S. 1.]: Springer-Verlag, 1994: 230-272.
  • 5Kristensen L M, Christensen S, Jensen K. The Practitioner's Guide to Coloured Petri Nets[J]. International Journal on Software Tools for Technology Transfer, 1998, 2(2): 98-132.
  • 6Matjaz B. Juric. A hands-on introduction to BPEL [EB/OL]. [ 2009-11-10 ]. http://www, oracle, corn/ technet work/articles/matjaz-bpell-090575, html.
  • 7Alves A, Arkin A, et al. Web Services Business Process Execution Language Version 2. 0 (WS-BPEL 2. 0) [S]. Billerica: Organization for the Advancement of Structured Information Standards (OASIS), 2007.
  • 8Schroeder B A. On-line monitoring: A tutorial [J]. Computer, 1995, 28(6): 72-78.
  • 9Ferrara A. Web services: A process algebra approach [C]// Proc of the 2nd Int Conf on Service Oriented Computing (ICSOC'04). Piscataway, NJ: IEEE, 2004:242-251.
  • 10Diaz G, Pardo J, Cambronero M, et al. Automatic translation of WS-CDL choreographies to timed automata [G] ]/LNCS 3670: Proc oF the 2nd Int Workshop on Web Services and Formal Methods ( WS-FM'05 ). Berlin: Springer, 2005:230-242.

共引文献10

同被引文献59

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部