A Scheme of Trusted and Secure Access to WLAN

Pengchuan Zhao,Jianwei Liu,Shishuai Wang
DOI: https://doi.org/10.1109/ICECC.2012.299
2012-01-01
Abstract:Traditional WLAN security protocols are the basis of the WLAN's security, but they face many security risks always, one of the most important is that they cannot guarantee the terminal is trusted. The concept of Trusted Computing proposed by TCG aims to improve the terminal's security. This paper proposes a scheme for trusted and secure access to WLAN based on WAPI and Trust Computing. The scheme adopts Certificate less Public Key Cryptography (CL-PKC) to achieve session key agreement. CL-PKC is based on Identity Public Key Cryptography (ID-PKC), but it eliminates the key escrow problem in ID-PKC. The paper analyzes the security and efficiency of the scheme. The result indicates that the scheme can realize the two-way authentication and integrity verification, it also have better performance in computable cost. The scheme can become a basic scheme of trusted and secure access to WLAN.
What problem does this paper attempt to address?