ISSN 1000-1239 CN 11-1777/TP

• 信息安全 •

### 基于事件逻辑的WMN客户端与LTCA认证协议安全性分析

1. 1（华东交通大学软件学院 南昌 330013）；2（中国铁建重工集团有限公司 长沙 410100) (xiaomh@ecjtu.edu.cn)
• 出版日期: 2019-06-01
• 基金资助:
国家自然科学基金项目(61163005，61562026);江西省自然科学基金项目(20161BAB202063);江西省主要学科学术和技术带头人资助计划项目(20172BCB22015)

### Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events

Xiao Meihua1, Li Yanan1,2, Song Jiawen1, Wang Xizhong1, Li Wei1， Zhong Xiaomei1

1. 1（School of Software, East China Jiaotong University, Nanchang 330013）；2（China Railway Construction Heavy Industry, Changsha 410100)
• Online: 2019-06-01
• Supported by:
This work was supported by the National Natural Science Foundation of China (61163005, 61562026), the Natural Science Foundation of Jiangxi Province of China (20161BAB202063), and the Major Academic and Technical Leaders Foundation of Jiangxi Province (20172BCB22015).

Abstract: Wireless mesh network is a new type of broadband wireless network structure, which combines the advantages of wireless local area network and ad-hoc network. The research on wireless mesh network is one of the emerging research focuses about wireless networks. Based on the logic of events, the substitution rule is proposed to ensure the equivalent conversion of user interaction information in the process of property substitution by combining event structures, event classes, axiom clusters and random number lemma. With the basic sequences of authentication protocol between client and LTCA constructed by logic of events, the protocol actions between client and LTCA are formally described, and strong authentication property of the protocol is proved. Under reasonable assumptions, the security property of the authentication protocol between WMN client and LTCA is verified, and the research shows that both the security attributes of wireless network protocols and the authentication property between different principals of cryptographic protocols can be proved by logic of events. By simplifying the formal proof steps with flow chart, the process of logic of events proving protocol’s security property is described, similarly, by comparing and analyzing logic of events with other logical reasoning methods, the universal applicability of logic of events is shown.