Research Article
On the Security of Three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
@INPROCEEDINGS{10.1109/CHINACOM.2007.4469395, author={Qiang Tang}, title={On the Security of Three Versions of the WAI Protocol in Chinese WLAN Implementation Plan}, proceedings={2nd International ICST Conference on Communications and Networking in China}, publisher={IEEE}, proceedings_a={CHINACOM}, year={2008}, month={3}, keywords={Access protocols Communication system security Cryptographic protocols Message authentication Modular construction Moon Privacy Public key cryptography Stress Wireless LAN}, doi={10.1109/CHINACOM.2007.4469395} }
- Qiang Tang
Year: 2008
On the Security of Three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
CHINACOM
IEEE
DOI: 10.1109/CHINACOM.2007.4469395
Abstract
In this paper we investigate the security properties of three versions of the WAI protocol in Chinese WLAN implementation plan. We first revisit the security analysis that has been done to the version 1 and 2. we show that the security proof given by Li, Moon, and Ma is incorrect and the alternative protocol EWAP of Zhang and Ma is not secure. We further analyse the third version of the WAI protocol and prove its security in the Canetti-Krawczyk model. In addition, we also provide some practical security analysis of this version.
Copyright © 2007–2024 IEEE