[1]IEEE-SA. IEEE Std 802.11i, Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Medium Access Control (MAC) security enhancements [S]. Washington, DC: IEEE Computer Society, 2004.[2]IEEE-SA. IEEE Std 802.1X-2004, port-based network access control [S]. Washington, DC: IEEE Computer Society, 2004.[3]ABOBA B, BLUNK L, VOLLBRECHT J, et al. IETF RFC 3748, Extensible Authentication Protocol (EAP) [S]. Reston: IETF, 2004.[4]郭渊博,杨奎武,张畅,等.无线局域网安全:设计及实现[M].北京:国防工业出版社,2010:11-39.[5]WANG L, SRINIVASAN B, BHATTACHARJEE N. Security analysis and improvements on WLANs [J]. Journal of Networks, 2011, 6(3): 470-481.[6]周超,周城,郭亮. IEEE 802.1X的安全性分析及改进[J].计算机应用,2011,31(5):1165-1270.[7]IEEE-SA. IEEE Std 802.1X-2001, port-based network access control [S]. Washington, DC: IEEE Computer Society, 2001.[8]TURAB N, MOLDOVE F. A comparison between wireless LAN security protocols [J]. Electrical Engineering and Computer Science, 2009, 71(1): 61-80.[9]LEI J, FU X M, HOGREF D, et al. Comparative studies on authentication and key exchange methods for 802.11 wireless LAN [J]. Computers and Security, 2007, 26(5): 401-409.[10]DANTU R, CLOTHIER G, ATRI A. EAP methods for wireless networks [J]. Computer Standards and Interfaces, 2007, 29(3): 289-301.[11]宋宇波,胡爱群,姚冰心. 802.11i认证协议可验安全性形式化分析[J].中国工程科学,2010,12(1):67-73.[12]FUNK P, WILSON S B. IETF RFC5281, extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TTLSv0) [S]. Reston: IETF, 2008.[13]李永强,汪海航.针对802.1x-EAP安全认证协议的中间人攻击[J].计算机工程,2008,34(22):192-197.[14]STANLEY D, WALKER J, ABOBA B. IETF RFC4017, Extensible Authentication Protocol (EAP) method requirements for wireless LANs [S]. Reston: IETF, 2005.[15]MISHRA A, ARBAUGH W A. An initial security analysis of the IEEE 802.1x standard, CS2TR2 4328 [R]. Maryland: Maryland University, Department of Computer Science, 2002.[16]ASOKAN N, NIEMI V, NYBERG K. Man-in-the-middle in tunneled authentication protocols [C]// Proceedings of 2003 Security Protocols Workshop, LNCS 3364. Berlin: Springer-Verlag, 2005: 28-41. |