• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei. Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events[J]. Journal of Computer Research and Development, 2019, 56(6): 1275-1289. DOI: 10.7544/issn1000-1239.2019.20180466
Citation: Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei. Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events[J]. Journal of Computer Research and Development, 2019, 56(6): 1275-1289. DOI: 10.7544/issn1000-1239.2019.20180466

Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events

Funds: This work was supported by the National Natural Science Foundation of China (61163005, 61562026), the Natural Science Foundation of Jiangxi Province of China (20161BAB202063), and the Major Academic and Technical Leaders Foundation of Jiangxi Province (20172BCB22015).
More Information
  • Published Date: May 31, 2019
  • Wireless mesh network is a new type of broadband wireless network structure, which combines the advantages of wireless local area network and ad-hoc network. The research on wireless mesh network is one of the emerging research focuses about wireless networks. Based on the logic of events, the substitution rule is proposed to ensure the equivalent conversion of user interaction information in the process of property substitution by combining event structures, event classes, axiom clusters and random number lemma. With the basic sequences of authentication protocol between client and LTCA constructed by logic of events, the protocol actions between client and LTCA are formally described, and strong authentication property of the protocol is proved. Under reasonable assumptions, the security property of the authentication protocol between WMN client and LTCA is verified, and the research shows that both the security attributes of wireless network protocols and the authentication property between different principals of cryptographic protocols can be proved by logic of events. By simplifying the formal proof steps with flow chart, the process of logic of events proving protocol’s security property is described, similarly, by comparing and analyzing logic of events with other logical reasoning methods, the universal applicability of logic of events is shown.
  • Related Articles

    [1]Tang Guowei, Wang Shanshe, Zhang Yan, Zhao Debin. Fractal-Searching-Tree-Based Embedded Wavelet Image Coding[J]. Journal of Computer Research and Development, 2013, 50(7): 1484-1490.
    [2]Zhou Lian, Wang Guojin. Piecewise Linear Approximation of Rational Triangular Surfaces[J]. Journal of Computer Research and Development, 2012, 49(5): 1116-1122.
    [3]Han Xuming, Zuo Wanli, Wang Limin, Shi Xiaohu. Atmospheric Quality Assessment Model Based on Immune Algorithm Optimization and Its Applications[J]. Journal of Computer Research and Development, 2011, 48(7): 1307-1313.
    [4]Huang Weixian and Wang Guojin. The L\-2 Distances for Rational Surfaces Based on Matrix Representation of Degree Elevation[J]. Journal of Computer Research and Development, 2010, 47(8): 1338-1345.
    [5]Yan Guanghui and Li Zhanhuai. A Two Phases Unsupervised Sequential Forward Fractal Dimensionality Reduction Algorithm[J]. Journal of Computer Research and Development, 2008, 45(11): 1955-1964.
    [6]Chen Jun and Wang Guojin. Optimal Parameterizations of the Degree 2 Rational Bézier Curves[J]. Journal of Computer Research and Development, 2008, 45(9): 1601-1604.
    [7]He Chuanjiang, Liu Weisheng, Shen Xiaona. Fast Fractal Image Coding Based on Quincunx Sums of Normalized Blocks[J]. Journal of Computer Research and Development, 2007, 44(12): 2066-2071.
    [8]Li Yajuan and Wang Guozhao. Uniform Interval Implicitization of Rational Surfaces[J]. Journal of Computer Research and Development, 2006, 43(5): 914-919.
    [9]Wang Fangshi, Xu De, and Wu Weixin. A Cluster Algorithm of Automatic Key Frame Extraction Based on Adaptive Threshold[J]. Journal of Computer Research and Development, 2005, 42(10): 1752-1757.
    [10]Zhang Can, Tu Guofang, Liu Xiaozhou. Remote Sensing Image Processing Using Wavelet Fractal Interpolation[J]. Journal of Computer Research and Development, 2005, 42(2): 247-251.
  • Cited by

    Periodical cited type(3)

    1. 丁坤,刘增泉,张经炜,杨泽南,李喆雨. 基于图像奇异值分解的局部遮挡光伏阵列输出特性建模研究. 综合智慧能源. 2023(02): 53-60 .
    2. 李新. 功率谱估计在舰船噪声特征提取中的应用仿真. 舰船科学技术. 2022(04): 43-46 .
    3. 杨宝军. 基于有限元特征值的船舶螺旋桨噪声数据分类算法. 舰船科学技术. 2021(14): 7-9 .

    Other cited types(3)

Catalog

    Article views (836) PDF downloads (252) Cited by(6)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return