Jianqing Fu, Xiaoning Jiang, Ling-di Ping, Rong Fan
{"title":"一种用于802.11s密钥管理的新密钥更新协议","authors":"Jianqing Fu, Xiaoning Jiang, Ling-di Ping, Rong Fan","doi":"10.1109/ICIME.2009.14","DOIUrl":null,"url":null,"abstract":"In this paper, we identify a vulnerability of IEEE 802.11 wireless Mesh LANs in which a compromised mesh point can still receive data from other mesh points. Then we propose a new protocol that can counter this attack by considering the effective period of both the mesh points (MPs) when decide the lifetime of the key shared between them. We also amend 802.11s draft in order not to bring about a fundamental change to the whole key hierarchy, and propose a protocol to refresh the shared key when it expired. Then we prove the security of the protocol using Protocol Composition Logic (PCL).","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Novel Rekeying Protocol for 802.11s Key Management\",\"authors\":\"Jianqing Fu, Xiaoning Jiang, Ling-di Ping, Rong Fan\",\"doi\":\"10.1109/ICIME.2009.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we identify a vulnerability of IEEE 802.11 wireless Mesh LANs in which a compromised mesh point can still receive data from other mesh points. Then we propose a new protocol that can counter this attack by considering the effective period of both the mesh points (MPs) when decide the lifetime of the key shared between them. We also amend 802.11s draft in order not to bring about a fundamental change to the whole key hierarchy, and propose a protocol to refresh the shared key when it expired. Then we prove the security of the protocol using Protocol Composition Logic (PCL).\",\"PeriodicalId\":445284,\"journal\":{\"name\":\"2009 International Conference on Information Management and Engineering\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Information Management and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIME.2009.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Information Management and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIME.2009.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
摘要
在本文中,我们发现了IEEE 802.11无线网状局域网的一个漏洞,其中一个受损的网状点仍然可以从其他网状点接收数据。在此基础上,我们提出了一种新的协议,通过考虑两个mesh point (mp)的有效期来决定它们之间共享的密钥的生命周期,从而对抗这种攻击。我们还修改了802.11s草案,以避免对整个密钥层次结构带来根本性的改变,并提出了一种协议,以便在共享密钥过期时刷新共享密钥。然后利用协议组合逻辑(PCL)证明了协议的安全性。
A Novel Rekeying Protocol for 802.11s Key Management
In this paper, we identify a vulnerability of IEEE 802.11 wireless Mesh LANs in which a compromised mesh point can still receive data from other mesh points. Then we propose a new protocol that can counter this attack by considering the effective period of both the mesh points (MPs) when decide the lifetime of the key shared between them. We also amend 802.11s draft in order not to bring about a fundamental change to the whole key hierarchy, and propose a protocol to refresh the shared key when it expired. Then we prove the security of the protocol using Protocol Composition Logic (PCL).