A new security access scheme for WLANs and its performance simulation analysis

被引:0
|
作者
Obaidat, Mohammad S. [1 ]
Guelzim, Tarik [1 ]
机构
[1] Monmouth Univ, Dept Comp Sci, W Long Branch, NJ 07764 USA
关键词
security of WLANs; authentication; distance; proximity; neural networks; performance evaluation;
D O I
10.1177/0037549708096108
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The IEEE 802.11 standard is becoming the most popular and efficient network topology deployed today. Providing and ensuring the security of wireless network is an essential part to its continuous growth. Goals such as confidentiality and trust imply that every data transmitted by each user stays known only to the communication parties. Authorization of users is also a very important aspect of network integrity. There exist mechanisms defined by the Wi-Fi Protected Access (WPA) protocol that enable such functionality; however, recent attacks on such systems showed that these mechanisms can be defined. In this paper, we propose a new scheme to authenticate and authorize 802.11 wireless nodes within a network. This new layer of security relies on a neural network decision engine that restricts network access to mobile nodes whose physical location is within a threshold distance from the wireless access point or the controller of the network. This method gives an extra layer of security and allows policies to be enforced which only allow network access from a certain section of the network. We give a detailed description of the work done as well as a performance simulation analysis of this scheme.
引用
收藏
页码:311 / 321
页数:11
相关论文
共 50 条
  • [21] A new security key exchange channel for 802.11 WLANs
    Ouyang, YC
    Chang, RL
    Chiu, JH
    [J]. 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 216 - 221
  • [22] Practical Update of Scrambling Scheme and its Security Analysis
    Ogawa, Kazuto
    Inoue, Tomoyuki
    [J]. ITE TRANSACTIONS ON MEDIA TECHNOLOGY AND APPLICATIONS, 2018, 6 (01): : 110 - 123
  • [23] Security Analysis of Secure Electronic Ticket Scheme for ITS
    Guo, Yongning
    Liu, Chenglian
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4977 - 4982
  • [24] Security analysis of a threshold access control scheme based on smart cards
    Horng, G
    Liu, CL
    Hwang, YT
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (08) : 2177 - 2179
  • [25] A Collaborative Filtering Recommendation-Based Scheme for WLANs With Differentiated Access Service
    Chen, Zhikui
    Ning, Zhaolong
    Xiong, Qianzi
    Obaidat, Mohammad S.
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 1004 - 1014
  • [26] Performance Analysis of the TXOP Scheme in IEEE 802.11e WLANs with Bursty Error Channels
    Min, Geyong
    Hu, Jia
    Jia, Weijia
    Woodward, Mike E.
    [J]. 2009 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-5, 2009, : 1185 - +
  • [27] A TDMA based scheduling scheme in 802.11b WLANs with access point
    Abu-Sharkh, O
    Tewfik, AH
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 646 - 650
  • [28] A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS
    Jiao Luyao
    Li Yifa
    Qiao Shuaiting
    [J]. Journal of Electronics(China), 2013, 30 (02) : 198 - 203
  • [29] Performance Analyses of Adaptive Access mechanism in IEEE 802.11 WLANs
    He, Shuqian
    Shi, Chun
    Deng, Zhengjie
    [J]. ENERGY AND POWER TECHNOLOGY, PTS 1 AND 2, 2013, 805-806 : 1870 - 1873
  • [30] A New Scheme for Jointed Space-Polarization Diversity and Its Performance Analysis
    Deng, Yihua
    Yu, Xiangyu
    Me, Shengli
    [J]. 2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 417 - 420