A new security access scheme for WLANs and its performance simulation analysis

被引:0
|
作者
Obaidat, Mohammad S. [1 ]
Guelzim, Tarik [1 ]
机构
[1] Monmouth Univ, Dept Comp Sci, W Long Branch, NJ 07764 USA
关键词
security of WLANs; authentication; distance; proximity; neural networks; performance evaluation;
D O I
10.1177/0037549708096108
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The IEEE 802.11 standard is becoming the most popular and efficient network topology deployed today. Providing and ensuring the security of wireless network is an essential part to its continuous growth. Goals such as confidentiality and trust imply that every data transmitted by each user stays known only to the communication parties. Authorization of users is also a very important aspect of network integrity. There exist mechanisms defined by the Wi-Fi Protected Access (WPA) protocol that enable such functionality; however, recent attacks on such systems showed that these mechanisms can be defined. In this paper, we propose a new scheme to authenticate and authorize 802.11 wireless nodes within a network. This new layer of security relies on a neural network decision engine that restricts network access to mobile nodes whose physical location is within a threshold distance from the wireless access point or the controller of the network. This method gives an extra layer of security and allows policies to be enforced which only allow network access from a certain section of the network. We give a detailed description of the work done as well as a performance simulation analysis of this scheme.
引用
收藏
页码:311 / 321
页数:11
相关论文
共 50 条
  • [1] A token-based scheduling scheme for WLANs and its performance analysis
    Wang, Ping
    Zhuang, Weihua
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3716 - 3721
  • [2] On the impact of security on the performance of WLANs
    Barka, Ezedin
    Boulmalf, Mohammed
    [J]. Journal of Communications, 2007, 2 (SPL.ISS. 4): : 10 - 17
  • [3] On The Impact of Security on the Performance of WLANS
    Barka, Ezedin
    Boulmalf, Mohammed
    [J]. Journal of Communications, 2007, 2 (04): : 10 - 17
  • [4] The Performance Analysis of Direct/Cooperative Transmission with TXOP Scheme in WLANs
    Weng, Chien-Erh
    Yang, Lie
    Chen, Hsing-Chung
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 467 - 471
  • [5] Design and Analysis of a Prioritized Adaptive Multiple Access Scheme for VoIP over WLANs
    Feng, Bing
    Wang, Zhen
    Zhang, Chi
    Fang, Yuguang
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [6] A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis
    Wang, Ping
    Zhuang, Weihua
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (05) : 1708 - 1718
  • [7] Performance analysis of a k-round contention resolution scheme for WLANs
    Chang, Xiaoying
    Liu, Kai
    Liu, Feng
    [J]. ELECTRONICS LETTERS, 2015, 51 (06) : 532 - 533
  • [8] A New Time-based Fairness Scheme to Resolve the Performance Anomaly in WLANs
    Lee, Dongho
    Lee, Sunhun
    Chung, Kwangsue
    Song, Byunghun
    Lee, Sang Hong
    [J]. ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 326 - +
  • [9] A New Inter-Node Priority Access Enhancement Scheme for IEEE_802.11 WLANs
    Rebai, Ahmed-Riadh
    Hanafi, Said
    Alnuweiri, Hussein
    [J]. ITST: 2009 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORT SYSTEMS TELECOMMUNICATIONS, 2009, : 520 - +
  • [10] Secret Sharing Scheme Security and Performance Analysis
    Abdallah, Aisha
    Salleh, Mazleena
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 173 - 180