为应对电力通信网络日益严峻的安全挑战,对无线局域网鉴别和保密基础结构(WLAN authentication and privacy infrastructure,WAPI)协议在电力通信网络安全维护中的应用进行研究。首先,采用混合研究法,融合定量与定性分析。其次,将WAPI...为应对电力通信网络日益严峻的安全挑战,对无线局域网鉴别和保密基础结构(WLAN authentication and privacy infrastructure,WAPI)协议在电力通信网络安全维护中的应用进行研究。首先,采用混合研究法,融合定量与定性分析。其次,将WAPI协议与人工智能、区块链等现代技术融合。再次,将WAPI协议与其他安全协议进行比较。最后,探讨WAPI协议的发展前景。希望为维护电力通信网络安全提供有益参考。展开更多
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ...Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.展开更多
随着无线局域网技术的广泛应用,新的无线局域网安全标准被提出以增强无线局域网的安全性能。在分析WAPI(WLAN Authentication and Privacy Infrastructure)标准的技术特征和基本架构的基础上,介绍了无线接入点对WAPI认证机制的实现机理...随着无线局域网技术的广泛应用,新的无线局域网安全标准被提出以增强无线局域网的安全性能。在分析WAPI(WLAN Authentication and Privacy Infrastructure)标准的技术特征和基本架构的基础上,介绍了无线接入点对WAPI认证机制的实现机理和具体流程,并对WAPI认证机制的性能进行测试分析。展开更多
文摘为应对电力通信网络日益严峻的安全挑战,对无线局域网鉴别和保密基础结构(WLAN authentication and privacy infrastructure,WAPI)协议在电力通信网络安全维护中的应用进行研究。首先,采用混合研究法,融合定量与定性分析。其次,将WAPI协议与人工智能、区块链等现代技术融合。再次,将WAPI协议与其他安全协议进行比较。最后,探讨WAPI协议的发展前景。希望为维护电力通信网络安全提供有益参考。
基金The National Basic Research Program of China(973Program) (No.G1999035805)the Natural Science Foundation of ShannxiProvince (No.2007F37)China Postdoctoral Science Foundation (No.20060401008,20070410376).
文摘Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.
文摘随着无线局域网技术的广泛应用,新的无线局域网安全标准被提出以增强无线局域网的安全性能。在分析WAPI(WLAN Authentication and Privacy Infrastructure)标准的技术特征和基本架构的基础上,介绍了无线接入点对WAPI认证机制的实现机理和具体流程,并对WAPI认证机制的性能进行测试分析。