The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Trusted Network Connect는 인증 프로토콜의 보안을 강화하는 데 중요한 플랫폼 인증 및 무결성 확인 기능을 제공합니다. 그러나 이 기능을 구체적인 인증에 직접 적용하면 알 수 없는 공격과 효율성 저하에 취약합니다. 본 논문에서는 사용자 인증 시 플랫폼 인증과 무결성 검증을 완료한 신뢰할 수 있는 환경에서 WLAN Mesh 네트워크를 위한 새로운 인증 프로토콜인 TWMAP을 제안합니다. 그리고 클라이언트의 오버헤드를 줄이기 위해 Schnorr 비대칭 서명 방식을 활용합니다. 새로운 프로토콜의 보안 속성은 Universally Composable Security 모델을 사용하여 검사됩니다. 분석 비교 및 시뮬레이션 결과는 새로운 프로토콜이 컴퓨팅 및 통신 비용 측면에서 매우 효율적이라는 것을 보여줍니다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Zhuo MA, Jianfeng MA, SangJae MOON, Xinghua LI, "An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment" in IEICE TRANSACTIONS on Information,
vol. E93-D, no. 3, pp. 430-437, March 2010, doi: 10.1587/transinf.E93.D.430.
Abstract: Trusted Network Connect provides the functionality of the platform authentication and integrity verification which is crucial for enhancing the security of authentication protocols. However, applying this functionality directly to concrete authentications is susceptible to unknown attacks and efficiency degradation. In this paper, we propose TWMAP, a novel authentication protocol for WLAN Mesh networks in a trusted environment which completed the platform authentication and integrity verification during the user authentication. And, the Schnorr asymmetric signature scheme is utilized to reduce the overhead of the client. The security properties of the new protocol are examined using the Universally Composable Security model. The analytic comparisons and simulation results show that the new protocol is very efficient in both computing and communication costs.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E93.D.430/_p
부
@ARTICLE{e93-d_3_430,
author={Zhuo MA, Jianfeng MA, SangJae MOON, Xinghua LI, },
journal={IEICE TRANSACTIONS on Information},
title={An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment},
year={2010},
volume={E93-D},
number={3},
pages={430-437},
abstract={Trusted Network Connect provides the functionality of the platform authentication and integrity verification which is crucial for enhancing the security of authentication protocols. However, applying this functionality directly to concrete authentications is susceptible to unknown attacks and efficiency degradation. In this paper, we propose TWMAP, a novel authentication protocol for WLAN Mesh networks in a trusted environment which completed the platform authentication and integrity verification during the user authentication. And, the Schnorr asymmetric signature scheme is utilized to reduce the overhead of the client. The security properties of the new protocol are examined using the Universally Composable Security model. The analytic comparisons and simulation results show that the new protocol is very efficient in both computing and communication costs.},
keywords={},
doi={10.1587/transinf.E93.D.430},
ISSN={1745-1361},
month={March},}
부
TY - JOUR
TI - An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment
T2 - IEICE TRANSACTIONS on Information
SP - 430
EP - 437
AU - Zhuo MA
AU - Jianfeng MA
AU - SangJae MOON
AU - Xinghua LI
PY - 2010
DO - 10.1587/transinf.E93.D.430
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E93-D
IS - 3
JA - IEICE TRANSACTIONS on Information
Y1 - March 2010
AB - Trusted Network Connect provides the functionality of the platform authentication and integrity verification which is crucial for enhancing the security of authentication protocols. However, applying this functionality directly to concrete authentications is susceptible to unknown attacks and efficiency degradation. In this paper, we propose TWMAP, a novel authentication protocol for WLAN Mesh networks in a trusted environment which completed the platform authentication and integrity verification during the user authentication. And, the Schnorr asymmetric signature scheme is utilized to reduce the overhead of the client. The security properties of the new protocol are examined using the Universally Composable Security model. The analytic comparisons and simulation results show that the new protocol is very efficient in both computing and communication costs.
ER -