[1] IEEE 802 LAN/MAN Standards Committee. IEEE standard for local and metropolitan and area networks:Media Access Control(MAC) security:IEEE 802.1AE-2006[S]. Piscataway:IEEE, 2006-08-18. [2] IEEE 802 LAN/MAN Standards Committee. IEEE standard for local and metropolitan and area networks:port-based network access control:IEEE 802.1X-2010[S]. Piscataway:IEEE,2010-02-05. [3] 中国通信标准化协会. 有线局域网媒体访问控制安全技术要求:YDB 066-2011[S]. 北京:中国通信标准化协会,2011-08-05. (China Communications Standards Association. Wired local area network medium access control security requirements:YDB 066-2011[S]. Beijing:China Communications Standards Association,2011-08-05.) [4] 中华人民共和国国家质量监督检验检疫总局, 中国国家标准化管理委员会. 信息技术系统间远程通信和信息交换局域网和城域网特定要求第3部分:带碰撞检测的载波侦听多址访问(CSMA/CD)的访问方法和物理层规范:GB/T 15629.3-2014[S]. 北京:中国质量标准出版传媒有限公司(中国标准出版社), 2014-12-22. (General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China. Information technology:Telecommunications and information exchange between systems:Local and metropolitan area networks:Specific requirements:Part 3:Carrier Sense Multiple Access with Collision Detection(CSMA/CD)access method and physical layer specifications:GB/T 15629.3-2014[S]. Beijing:China Quality and Standards Publishing & Media Co.,Ltd.,2014-12-22.) [5] International Organization for Standardization. Information technology:Security techniques:Entity authentication mechanisms:Part 3:Entity authentication using a public key algorithm-amendment 1:ISO/IEC 9798-3:1998/AMD 1:2010[S]. Geneva:ISO,2010-06. [6] 肖跃雷, 武君胜, 朱志祥. 可信计算环境下的MACSec安全关联方案[J]. 计算机应用研究,2019,36(10):3043-3047,3062. (XIAO Y L,WU J S,ZHU Z X. MACSec security association scheme for trusted computing environment[J]. Application Research of Computers,2019,36(10):3043-3047,3062.) [7] 肖跃雷, 武君胜, 朱志祥. 基于预共享密钥的LAN安全关联方案改进与分析[J]. 计算机应用,2018,38(11):3246-3251.(XIAO Y L,WU J S,ZHU Z X. Improvement and analysis of LAN security association scheme based on pre-shared key[J]. Journal of Computer Applications,2018,38(11):3246-3251.) [8] Trusted Computing Group. TCG specification architecture overview specification version 1.4[EB/OL].[2020-04-20]. http://www.trustedcomputinggroup.org/. [9] Trusted Computing Group. TCG infrastructure working group-reference architecture for interoperability (part I)-specification version 1.0-revision 1[EB/OL].[2020-03-29]. https://www.trustedcomputinggroup.org/wp-content/uploads/IWG_Architecture_v1_0_r1.pdf. [10] Trusted Computing Group. TCG trusted network communications-TNC architecture for interoperability-specification version 1.5-revision 13[EB/OL].[2018-04-22]. https://trustedcomputinggroup.org/wp-content/uploads/TCG-TNCArchitecture-for-Interoperability-Version-2.0-Revision-13-.pdf. [11] 舒晓慧, 金小晰, 吴瑶. 网络交换机的安全威胁与防范[J]. 网络安全技术与应用,2014(10):130-131.(SHU X H,JIN X X, WU Y. Security threats and prevention of a network switch[J]. Network Security Technology and Application, 2014(10):130-131.) [12] 康双勇. 网络交换机的威胁攻击与安全防范[J]. 保密科学技术,2017(1):30-33.(KANG S Y. Threat attacks and security prevention of network switch[J]. Secrecy Science and Technology,2017(1):30-33.) [13] 侯丽娟. 网络交换机安全加固措施的实现[J]. 科技传播, 2017,9(24):117-118.(HOU L J. Implementation of security reinforcement methods for network switch[J]. Public Communication of Science and Technology, 2017, 9(24):117-118.) [14] FÁBREGA F J T,HERZOG J C,GUTTMAN J D. Strand spaces:proving security protocols correct[J]. Journal of Computer Security,1999,7(2/3):191-230. [15] HERZOG J C. The Diffie-Hellman key-agreement scheme in the strand space model[C]//Proceedings of the 16th IEEE Computer Security Foundations Workshop. Piscataway:IEEE, 2003:234-247. [16] XIAO Y,WANG Y,PANG L. Verification of trusted network access protocols in the strand space model[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2012,E95-A (3):665-668. [17] TANG Q. On the security of three versions of the WAI protocol in Chinese WLAN implementation plan[C]//Proceedings of the 2nd International Conference on Communications and Networking in China. Piscataway:IEEE,2007:333-339. [18] 铁满霞, 李建东, 王育民. WAPI密钥管理协议的PCL证明[J]. 电子与信息学报,2009,31(2):444-447.(TIE M X,LI J D, WANG Y M. A correctness proof of WAPI key management protocol based on PCL[J]. Journal of Electronics and Information Technology,2009,31(2):444-447.) |