Journal on Communications ›› 2014, Vol. 35 ›› Issue (7): 94-103.doi: 10.3969/j.issn.1000-436x.2014.07.012

• paperⅡ • Previous Articles     Next Articles

WLAN Mesh security association scheme in trusted computing environment

Yue-lei XIAO1,Yu-min WANG2,Liao-jun PANG3,Shi-chong TAN2   

  1. 1 Institute of IOT and IT-based Industrialization,Xi'an University of Posts&Telecommunications,Xi'an 710061,China
    2 State Key Lab.of Integrated Service Networks, Xidian University, Xi'an 710071,China
    3 School of Life Science and Technology, Xidian University,Xi'an 710071,China
  • Online:2014-07-25 Published:2017-06-24
  • Supported by:
    The Scientific Research Foundation for the Junior Teachers of Xi`an University of Posts&Telecommunica-tions;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foun-dation of China-Guangdong Provincial People's Government of the Joint Natural Science Fund Projects

Abstract:

To solve the existing problems caused by that the third version of WLAN authentication infrastructure (WAI) protocol was used to establish WLAN Mesh security association, a WLAN Mesh security association scheme based on an improved WAI protocol was proposed. The results of performance analysis of the scheme show that the scheme improves the performance of WLAN Mesh security association, especially decreases the overhead of the authentication server (AS). Then, on basis of this scheme, a WLAN Mesh security association scheme in trusted computing environment was put forward to meet the demand of trusted computing environment. Moreover, the two WLAN Mesh security association schemes were proved secure in the strand space model (SSM).

Key words: WLAN Mesh, trusted computing, platform-authentication, strand space model, security association

No Suggested Reading articles found!