The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Trusted Network Connect fournit les fonctionnalités d'authentification et de vérification de l'intégrité de la plate-forme qui sont cruciales pour améliorer la sécurité des protocoles d'authentification. Cependant, l’application directe de cette fonctionnalité à des authentifications concrètes est susceptible d’être victime d’attaques inconnues et d’une dégradation de l’efficacité. Dans cet article, nous proposons TWMAP, un nouveau protocole d'authentification pour les réseaux WLAN Mesh dans un environnement de confiance qui complète l'authentification de la plateforme et la vérification de l'intégrité lors de l'authentification de l'utilisateur. Et le schéma de signature asymétrique Schnorr est utilisé pour réduire les frais généraux du client. Les propriétés de sécurité du nouveau protocole sont examinées à l'aide du modèle de sécurité universellement composable. Les comparaisons analytiques et les résultats de simulation montrent que le nouveau protocole est très efficace en termes de coûts de calcul et de communication.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Zhuo MA, Jianfeng MA, SangJae MOON, Xinghua LI, "An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment" in IEICE TRANSACTIONS on Information,
vol. E93-D, no. 3, pp. 430-437, March 2010, doi: 10.1587/transinf.E93.D.430.
Abstract: Trusted Network Connect provides the functionality of the platform authentication and integrity verification which is crucial for enhancing the security of authentication protocols. However, applying this functionality directly to concrete authentications is susceptible to unknown attacks and efficiency degradation. In this paper, we propose TWMAP, a novel authentication protocol for WLAN Mesh networks in a trusted environment which completed the platform authentication and integrity verification during the user authentication. And, the Schnorr asymmetric signature scheme is utilized to reduce the overhead of the client. The security properties of the new protocol are examined using the Universally Composable Security model. The analytic comparisons and simulation results show that the new protocol is very efficient in both computing and communication costs.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E93.D.430/_p
Copier
@ARTICLE{e93-d_3_430,
author={Zhuo MA, Jianfeng MA, SangJae MOON, Xinghua LI, },
journal={IEICE TRANSACTIONS on Information},
title={An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment},
year={2010},
volume={E93-D},
number={3},
pages={430-437},
abstract={Trusted Network Connect provides the functionality of the platform authentication and integrity verification which is crucial for enhancing the security of authentication protocols. However, applying this functionality directly to concrete authentications is susceptible to unknown attacks and efficiency degradation. In this paper, we propose TWMAP, a novel authentication protocol for WLAN Mesh networks in a trusted environment which completed the platform authentication and integrity verification during the user authentication. And, the Schnorr asymmetric signature scheme is utilized to reduce the overhead of the client. The security properties of the new protocol are examined using the Universally Composable Security model. The analytic comparisons and simulation results show that the new protocol is very efficient in both computing and communication costs.},
keywords={},
doi={10.1587/transinf.E93.D.430},
ISSN={1745-1361},
month={March},}
Copier
TY - JOUR
TI - An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment
T2 - IEICE TRANSACTIONS on Information
SP - 430
EP - 437
AU - Zhuo MA
AU - Jianfeng MA
AU - SangJae MOON
AU - Xinghua LI
PY - 2010
DO - 10.1587/transinf.E93.D.430
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E93-D
IS - 3
JA - IEICE TRANSACTIONS on Information
Y1 - March 2010
AB - Trusted Network Connect provides the functionality of the platform authentication and integrity verification which is crucial for enhancing the security of authentication protocols. However, applying this functionality directly to concrete authentications is susceptible to unknown attacks and efficiency degradation. In this paper, we propose TWMAP, a novel authentication protocol for WLAN Mesh networks in a trusted environment which completed the platform authentication and integrity verification during the user authentication. And, the Schnorr asymmetric signature scheme is utilized to reduce the overhead of the client. The security properties of the new protocol are examined using the Universally Composable Security model. The analytic comparisons and simulation results show that the new protocol is very efficient in both computing and communication costs.
ER -