%0 Journal Article
%T Research on Wireless Security Protocol Design
无线安全协议设计方法研究
%A GU Xiang
%A ZHANG Zhen
%A QIU Jian-lin
%A
顾翔
%A 张臻
%A 邱建林
%J 计算机科学
%D 2011
%I
%X Discussed general steps of a wireless security protocol design, including abstracting of application environment, analyzing weakness of application-specific network, confirming objectives of protocol to be designed, analyzing advantages and disadvantages of the existing similar protocols, designing protocol, proofing protocol security. And in accordance with these steps,a new wireless network authentication protocol was designed as an example. Practice shows that these steps could guide the designing of wireless security protocols better. They could also be used to guide the designing of some small application-layer protocols.
%K Wireless I
%K AN
%K Security protocol
%K Authentication protocol
%K Formal technology
%K Protocol design
无线局域网,安全协议,认证协议,形式化技术,协议设计
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=A72829DDE955E0D226AF21BDB7AC9168&yid=9377ED8094509821&vid=16D8618C6164A3ED&iid=9CF7A0430CBB2DFD&sid=89F76E117E9BDB76&eid=D767283A3B658885&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=0