{"title":"一种安全的无线网络动态密码和加密协议","authors":"P. Yu, U. Pooch","doi":"10.1109/EURCON.2009.5167898","DOIUrl":null,"url":null,"abstract":"With the fast growth of wireless networking in population, security became an essential issue for data privacy. Encryption mechanisms relying on static key structure, such as WEP (802.11) and TKIP (802.1x), are vulnerable to key cracking by capturing wireless packets. Although new standards have been developed to fulfill this gap, there is still a lack of a stable security protocol. In this paper, we present a light-weight and solid i-key encryption protocol to enhance the security of wireless communication. With this dynamic re-keying mechanism, only valid clients can decrypt the ciphertext and reveal the message by using the unique secret i-key they have to prevent the sensitive data from being accessed by unauthorized recipients. In addition, test results indicate that i-key protocol can perform efficiently in different wireless environment.","PeriodicalId":256285,"journal":{"name":"IEEE EUROCON 2009","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A secure dynamic cryptographic and encryption protocol for wireless networks\",\"authors\":\"P. Yu, U. Pooch\",\"doi\":\"10.1109/EURCON.2009.5167898\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the fast growth of wireless networking in population, security became an essential issue for data privacy. Encryption mechanisms relying on static key structure, such as WEP (802.11) and TKIP (802.1x), are vulnerable to key cracking by capturing wireless packets. Although new standards have been developed to fulfill this gap, there is still a lack of a stable security protocol. In this paper, we present a light-weight and solid i-key encryption protocol to enhance the security of wireless communication. With this dynamic re-keying mechanism, only valid clients can decrypt the ciphertext and reveal the message by using the unique secret i-key they have to prevent the sensitive data from being accessed by unauthorized recipients. In addition, test results indicate that i-key protocol can perform efficiently in different wireless environment.\",\"PeriodicalId\":256285,\"journal\":{\"name\":\"IEEE EUROCON 2009\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE EUROCON 2009\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EURCON.2009.5167898\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE EUROCON 2009","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EURCON.2009.5167898","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A secure dynamic cryptographic and encryption protocol for wireless networks
With the fast growth of wireless networking in population, security became an essential issue for data privacy. Encryption mechanisms relying on static key structure, such as WEP (802.11) and TKIP (802.1x), are vulnerable to key cracking by capturing wireless packets. Although new standards have been developed to fulfill this gap, there is still a lack of a stable security protocol. In this paper, we present a light-weight and solid i-key encryption protocol to enhance the security of wireless communication. With this dynamic re-keying mechanism, only valid clients can decrypt the ciphertext and reveal the message by using the unique secret i-key they have to prevent the sensitive data from being accessed by unauthorized recipients. In addition, test results indicate that i-key protocol can perform efficiently in different wireless environment.