TAILIEUCHUNG - Multiagent-Systems 2010 Part 10

Tham khảo tài liệu 'multiagent-systems 2010 part 10', kỹ thuật - công nghệ, cơ khí - chế tạo máy phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network 263 2. Wireless and quantum cryptography As we described above that security defines WEP Edeny J. Arbaugh . 2004 for the authentication and data confidentiality of user data over the wireless link. However WEP was not well designed and presents serious vulnerabilities as a new standard for the security. In this context is defined to rectify the flaws of WEP. 80211i received much attention from specialists in cryptography and network security. Regarding the authentication and key management we knew that defines two authentication and key management methods namely authentication and preshared key. The former is for large network having an important number of access points and the later is suitable for small network. Therefore the former has three elements participating to the authentication and key management are the supplicant or mobile terminal authenticator or access point and the authentication server. Once having the pairwise master key PMK the access point starts the four -way handshake for the mutual authentication and the derivation of the pairwise transient key PTK with the mobile terminal. In contrast to the the preshared key is involved in the authentication and key management using preshared key without authentication server and no extensible authentication protocol EAP -based authentication. Following Thi Mai Trang Nguyen et al. 2006 we are using Figure 1 shows the pairwise key hierarchy containing the keys related to the encryption of unicast traffic. It is noted that has many keys at different levels which becoming a key hierarch as shown Figure 1. At the top level there is the master key titled pairwise master key PMK that is used to derive the other keys. Fig. 1. Pairwise key hierarchy It is noted that has many keys at different levels which becoming a key hierarch as shown Figure 1.

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.