2nd International ICST Conference on Communications and Networking in China

Research Article

On the Security of Three Versions of the WAI Protocol in Chinese WLAN Implementation Plan

  • @INPROCEEDINGS{10.1109/CHINACOM.2007.4469395,
        author={Qiang Tang},
        title={On the Security of Three Versions of the WAI Protocol in Chinese WLAN Implementation Plan},
        proceedings={2nd International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2008},
        month={3},
        keywords={Access protocols  Communication system security  Cryptographic protocols  Message authentication  Modular construction  Moon  Privacy  Public key cryptography  Stress  Wireless LAN},
        doi={10.1109/CHINACOM.2007.4469395}
    }
    
  • Qiang Tang
    Year: 2008
    On the Security of Three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2007.4469395
Qiang Tang1,2,*
  • 1: Royal Holloway, University of London,Egham, Surrey TW20 0EX, UK.
  • 2: Departement d'Informatique, Ecole Normale Superieure, 45 Rue d'Ulm, 75230 Paris Cedex 05, France
*Contact email: qiang.tang@rhul.ac.uk

Abstract

In this paper we investigate the security properties of three versions of the WAI protocol in Chinese WLAN implementation plan. We first revisit the security analysis that has been done to the version 1 and 2. we show that the security proof given by Li, Moon, and Ma is incorrect and the alternative protocol EWAP of Zhang and Ma is not secure. We further analyse the third version of the WAI protocol and prove its security in the Canetti-Krawczyk model. In addition, we also provide some practical security analysis of this version.