WLAN Mesh security association scheme in trusted computing environment
To solve the existing problems caused by that the third version of WLAN authentication infrastructure (WAI) protocol was used to establish WLAN Mesh security association, a WLAN Mesh security association scheme based on an improved WAI protocol was proposed. The results of performance analysis of th...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.07.012/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539738428768256 |
---|---|
author | Yue-lei XIAO Yu-min WANG Liao-jun PANG Shi-chong TAN |
author_facet | Yue-lei XIAO Yu-min WANG Liao-jun PANG Shi-chong TAN |
author_sort | Yue-lei XIAO |
collection | DOAJ |
description | To solve the existing problems caused by that the third version of WLAN authentication infrastructure (WAI) protocol was used to establish WLAN Mesh security association, a WLAN Mesh security association scheme based on an improved WAI protocol was proposed. The results of performance analysis of the scheme show that the scheme improves the performance of WLAN Mesh security association, especially decreases the overhead of the authentication server (AS). Then, on basis of this scheme, a WLAN Mesh security association scheme in trusted computing environment was put forward to meet the demand of trusted computing environment. Moreover, the two WLAN Mesh security association schemes were proved secure in the strand space model (SSM). |
format | Article |
id | doaj-art-715a463412cb492ebde7917fb6d7a867 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2014-07-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-715a463412cb492ebde7917fb6d7a8672025-01-14T06:43:46ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-07-01359410359682732WLAN Mesh security association scheme in trusted computing environmentYue-lei XIAOYu-min WANGLiao-jun PANGShi-chong TANTo solve the existing problems caused by that the third version of WLAN authentication infrastructure (WAI) protocol was used to establish WLAN Mesh security association, a WLAN Mesh security association scheme based on an improved WAI protocol was proposed. The results of performance analysis of the scheme show that the scheme improves the performance of WLAN Mesh security association, especially decreases the overhead of the authentication server (AS). Then, on basis of this scheme, a WLAN Mesh security association scheme in trusted computing environment was put forward to meet the demand of trusted computing environment. Moreover, the two WLAN Mesh security association schemes were proved secure in the strand space model (SSM).http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.07.012/WLAN Meshtrusted computingplatform-authenticationstrand space modelsecurity association |
spellingShingle | Yue-lei XIAO Yu-min WANG Liao-jun PANG Shi-chong TAN WLAN Mesh security association scheme in trusted computing environment Tongxin xuebao WLAN Mesh trusted computing platform-authentication strand space model security association |
title | WLAN Mesh security association scheme in trusted computing environment |
title_full | WLAN Mesh security association scheme in trusted computing environment |
title_fullStr | WLAN Mesh security association scheme in trusted computing environment |
title_full_unstemmed | WLAN Mesh security association scheme in trusted computing environment |
title_short | WLAN Mesh security association scheme in trusted computing environment |
title_sort | wlan mesh security association scheme in trusted computing environment |
topic | WLAN Mesh trusted computing platform-authentication strand space model security association |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.07.012/ |
work_keys_str_mv | AT yueleixiao wlanmeshsecurityassociationschemeintrustedcomputingenvironment AT yuminwang wlanmeshsecurityassociationschemeintrustedcomputingenvironment AT liaojunpang wlanmeshsecurityassociationschemeintrustedcomputingenvironment AT shichongtan wlanmeshsecurityassociationschemeintrustedcomputingenvironment |