[1] 802.11iTM IEEE Standard for Information technology—Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11:Wireless LAN Medium Access Control(MAC)and Physical Layer(PHY)specifications Amendment 6:Medium Access Control (MAC) Security Enhancements[R]. [2] Bernard Aboba, Ashwin Palekar.IEEE 802.Ix and RADIUS Security.doc:IEEE 802.11-01/657r0,Nov. 2001[R]. [3] Snehasish Parhi , Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey, I.J[J]. Computer Network and Information Security, pp. 31-46,Mar.2012. [4] Valli Kumari, Krishnam Raju K, Formal verification of IEEE 802.11w authentication protocol[C]. 2nd International Conference on Communication, Computing & Security [ICCCS-2012], pp. 716- 722. [5] Agrawal R,Kiernan J.Watermarking Relational Databases[C]. Proc.of the 28th Conference on Very Large Databases.Hong Kong,China:[s.n.], 2002. [6] 贺旭娜,阴东锋. 基于802_11的无线局域网加密协议脆弱性研究[J]. 洛阳师范学院学报,2012,31(8):79-81. [7] 孙宏,杨义先.无线局域网协议802.11安全性分析[J]. 电子学报. 2003,7(7):1098-1100.