Xiehua Li

Shanghai University, Shanghai, Shanghai Shi, China

Are you Xiehua Li?

Claim your profile

Publications (4)0.51 Total impact

  • Liming Hao · Xiehua Li · Shutang Yang · Songnian Lu
    [Show abstract] [Hide abstract]
    ABSTRACT: Public key certificate is the prerequisite for proving identity authentication between mobile ad hoc networks (MANET) nodes. However, for MANET's dynamic topologies and infrastructure-less that brings the challenges for public key verification, similarly in hierarchical public key infrastructure (PKI) in MANET. In this paper, we propose a fast authentication public key infrastructure (FA-PKI) for MANET, which does not require on-line centralize authority and certificate collection, can authenticate each other between MANET nodes. As the name implies, FA-PKI speeds up identity authentication process, while we employ trusted computing (TC) technology to enhance security in MANET. Furthermore, we extend this scheme into Bridge PKI
    No preview · Conference Paper · Oct 2006
  • Xiehua Li · Liming Hao · Shutang Yang · Jianhua Li
    [Show abstract] [Hide abstract]
    ABSTRACT: EAP-AKA is the extensible authentication protocol (EAP) mechanism for authentication and key distribution using the authentication and key agreement (AKA) mechanism used in the 3<sup>rd</sup> generation mobile networks. The improved authentication tests model is a formal verification method for security protocol analysis, which enhances the original authentication tests model in proving symmetric key protocol and succeeds in finding flaws of security protocols. This paper formally analyzes and verifies the security properties of EAP-AKA authentication process with the improved authentication tests. The proof result shows that the authentication process of EAP-AKA can guarantee the security of wireless communication
    No preview · Conference Paper · Oct 2006
  • Xiehua Li · Shutang Yang · Jianhua Li · Hongwen Zhu
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper proposes the improved authentication tests in order to find the potential attacks on security protocols. It is based on the authentication tests theory and enhances the original methods by introducing the notion of message type. Formalized definition of replay attacks have been integrated into the original theoretical models for further verification of security protocols. The thoroughly proof of initial and subsequent authentications in Neuman-Stubblebine protocol shows that the improved authentication tests can find flaws of the protocol more efficiently than the original ones. KeywordsAuthentication tests-Message type-Neuman-Stubblebine protocol-Improved authentication tests
    No preview · Chapter · Feb 2006
  • Xiehua Li · ShuTang Yang · Jian-Hua Li · HongWen Zhu

    No preview · Conference Paper · Jan 2006