Journal of Computer Applications ›› 2016, Vol. 36 ›› Issue (5): 1236-1245.DOI: 10.11772/j.issn.1001-9081.2016.05.1236

Previous Articles     Next Articles

Security analysis and implementation for wireless local area network access protocol via near field communication authentication

LI Yun1,2, CHEN Pangsen3, SUN Shanlin1   

  1. 1. College of Electronic Information and Automation, Guilin University of Aerospace Technology, Guilin Guangxi 541004, China;
    2. College of Electronic Information Engineering, Tianjin University, Tianjin 300072, China;
    3. College of Information and Communication, Guilin University of Electronic Technology, Guilin Guangxi 541004, China
  • Received:2015-09-23 Revised:2015-11-10 Online:2016-05-10 Published:2016-05-09
  • Supported by:
    This work is partially supported by National Natural Science Foundation of China (61162003), the Natural Science Foundation of Guangxi (2015GXNSFAA139298), the Natural Science Foundation of Guilin University of Aerospace Technology (YJ1403).

基于近场通信认证的无线局域网无线接入协议的安全性设计

李云1,2, 陈庞森3, 孙山林1   

  1. 1. 桂林航天工业学院 电子信息与自动化学院, 广西 桂林 541004;
    2. 天津大学 电子信息工程学院, 天津 300072;
    3. 桂林电子科技大学 信息与通信学院, 广西 桂林 541004
  • 通讯作者: 李云
  • 作者简介:李云(1978-),女,广西南宁人,博士研究生,主要研究方向:水下传感网络、认知网络;陈庞森(1990-),男,四川内江人,硕士研究生,主要研究方向:移动通信系统;孙山林(1973-),男,河南邓州人,教授,博士,主要研究方向:无线通信系统、光微波通信系统。
  • 基金资助:
    国家自然科学基金资助项目(61162003);广西自然科学基金资助项目(2015GXNSFAA139298);桂林航天工业学院自然科学基金资助项目(YJ1403)。

Abstract: Aiming at the problems existing in point-to-point communication model of Wireless Local Area Network (WLAN) protocol via Near Field Communication (NFC) authentication, such as plaintext transferring, user's anonymous access, data being easily tapped and tampered, a security design of WLAN protocol via NFC was put forward. The security tunnel was built using Diffie-Hellman key exchange algorithm and second generation Secure Hash Algorithm (SHA) to transfer the random information, and the user's anonymity was eliminated using Elliptic Curve Digital Signature Algorithm (ECDSA). A prototype implementation on computer was given from requirement analysis, architecture design and sequence steps of the protocol. The experimental results by using Colored Petri Net (CPN) modeling show that the proposed protocol can execute stably and deal with the unauthorized access and eavesdropping problems of WLAN.

Key words: Near Field Communication (NFC), Wireless Local Area Network (WLAN), Colored Petri Net (CPN), Elliptic Curve Digital Signature Algorithm (ECDSA)

摘要: 针对基于近场通信(NFC)认证的无线局域网(WLAN)无线接入协议点对点通信模式存在的问题,如明文传输、用户接入匿名性、数据易于被窃听、易于被篡改等,提出基于NFC认证的WLAN无线接入协议安全性的设计。该协议采用Diffie-Hellman密钥交换算法与第二代安全散列算法(SHA)建立安全隧道来完成随机信息的交换;采用椭圆曲线数字签名算法来消除用户的匿名性。从协议需求分析、架构设计与协议时序步骤三个方面入手,给出了一个计算机上的原型实现。通过有色Petri网(CPN)建模,实验仿真结果表明:基于NFC认证的WLAN接入协议对于无线局域网的非法接入攻击与窃听攻击有着良好的抵抗效果。

关键词: 近场通信, 无线局域网, 有色Petri网, 椭圆曲线数字签名算法

CLC Number: