|
计算机科学 2011
Research on Wireless Security Protocol Design
|
Abstract:
Discussed general steps of a wireless security protocol design, including abstracting of application environment, analyzing weakness of application-specific network, confirming objectives of protocol to be designed, analyzing advantages and disadvantages of the existing similar protocols, designing protocol, proofing protocol security. And in accordance with these steps,a new wireless network authentication protocol was designed as an example. Practice shows that these steps could guide the designing of wireless security protocols better. They could also be used to guide the designing of some small application-layer protocols.