Security Authentication Protocol for WiMAX Wireless Network Based on Protocol Composition Logic

2010 ◽  
Vol 32 (9) ◽  
pp. 2106-2111
Author(s):  
Tao Feng ◽  
Zi-bin Zhang ◽  
Jian-feng Ma
2013 ◽  
Vol 336-338 ◽  
pp. 1892-1897
Author(s):  
Li Zhou ◽  
Fang Yong Tan

It’s important to insure wireless network authentication security. Via model checking tool SPIN modeling 802.1x EAP-TLS authentication protocol, communication parts are defined with model checking language PROMELA, security properties are expressed by LTL formula, and the model is verified. With the attack track given by SPIN, the security vulnerabilities caused by the improper configuration is pointed out, meanwhile the new tunnel authentication protocol is proposed to reduce the occurrence of attack and to improve the agreement.


2013 ◽  
Vol 427-429 ◽  
pp. 2403-2407
Author(s):  
She Qiang Peng ◽  
Long Wang

To address the security problems caused by the fake readers, and the weakness of low authentication protocol efficiency, a new RFID security authentication protocol based on Hash function is proposed. The security ability of the protocol is compared with other protocols' and is proved by doing the formal analysis. The theoretical analysis and formal proof is presented to prove the security ability of the protocol. Consequently, the result showed that the new protocol could protect the data privacy, achieve the data synchronization, prevent the tag from location tracking, avoid information reproduction, prevent clone and counterfeit and possess forward security ability which was useful for low-cost tags.


2013 ◽  
Vol 336-338 ◽  
pp. 1882-1886
Author(s):  
Tian Fu ◽  
Zhen Wang ◽  
Pan Deng Yang

With the gradual application of RFID technology, the problems of privacy security arouse people's great attention. To address the problems of the existing RFID authentication protocol, such as the weakness on security and privacy, the high cost and the un-stabilizing systems performance, this paper puts forward a kind effective protection of privacy and low cost RFID security authentication protocol, analyses the security and performance of this protocol. This protocol can not only effectively solve the problems of replay attacks, location privacy attack and data synchronization, but also greatly use the Reader computing resources to reduce the cost of system construction, so it is appropriate for the application of RFID system.


Sign in / Sign up

Export Citation Format

Share Document