Đang chuẩn bị liên kết để tải về tài liệu:
Multiagent-Systems 2010 Part 10

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Tham khảo tài liệu 'multiagent-systems 2010 part 10', kỹ thuật - công nghệ, cơ khí - chế tạo máy phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network 263 2. Wireless 802.11 and quantum cryptography As we described above that 802.11 security defines WEP Edeny J. Arbaugh W.A. 2004 for the authentication and data confidentiality of user data over the wireless link. However WEP was not well designed and presents serious vulnerabilities as a new standard for the 802.11 security. In this context 802.11i is defined to rectify the flaws of WEP. 80211i received much attention from specialists in cryptography and network security. Regarding the 802.11i authentication and key management we knew that 802.11i defines two authentication and key management methods namely 802.1X authentication and preshared key. The former is for large network having an important number of access points and the later is suitable for small network. Therefore the former has three elements participating to the authentication and key management are the supplicant or mobile terminal authenticator or access point and the authentication server. Once having the pairwise master key PMK the access point starts the four -way handshake for the mutual authentication and the derivation of the pairwise transient key PTK with the mobile terminal. In contrast to the 802.1X the preshared key is involved in the authentication and key management using preshared key without authentication server and no extensible authentication protocol EAP -based authentication. Following Thi Mai Trang Nguyen et al. 2006 we are using Figure 1 shows the pairwise key hierarchy containing the keys related to the encryption of unicast traffic. It is noted that 802.11i has many keys at different levels which becoming a key hierarch as shown Figure 1. At the top level there is the master key titled pairwise master key PMK that is used to derive the other keys. Fig. 1. Pairwise key hierarchy It is noted that 802.11i has many keys at different levels which becoming a key hierarch as shown Figure 1.

TÀI LIỆU LIÊN QUAN