A new security access scheme for WLANs and its performance simulation analysis

被引:0
|
作者
Obaidat, Mohammad S. [1 ]
Guelzim, Tarik [1 ]
机构
[1] Monmouth Univ, Dept Comp Sci, W Long Branch, NJ 07764 USA
关键词
security of WLANs; authentication; distance; proximity; neural networks; performance evaluation;
D O I
10.1177/0037549708096108
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The IEEE 802.11 standard is becoming the most popular and efficient network topology deployed today. Providing and ensuring the security of wireless network is an essential part to its continuous growth. Goals such as confidentiality and trust imply that every data transmitted by each user stays known only to the communication parties. Authorization of users is also a very important aspect of network integrity. There exist mechanisms defined by the Wi-Fi Protected Access (WPA) protocol that enable such functionality; however, recent attacks on such systems showed that these mechanisms can be defined. In this paper, we propose a new scheme to authenticate and authorize 802.11 wireless nodes within a network. This new layer of security relies on a neural network decision engine that restricts network access to mobile nodes whose physical location is within a threshold distance from the wireless access point or the controller of the network. This method gives an extra layer of security and allows policies to be enforced which only allow network access from a certain section of the network. We give a detailed description of the work done as well as a performance simulation analysis of this scheme.
引用
收藏
页码:311 / 321
页数:11
相关论文
共 50 条
  • [41] Wireless Sensor Network Simulation for Security and Performance Analysis
    Diaz, A.
    Sanchez, P.
    Sancho, J.
    Rico, J.
    [J]. DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 432 - 435
  • [42] Design and performance analysis of an ARQ scheme for broadband wireless access
    Guerbuez, Oezguer
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (06) : 1989 - 1998
  • [43] Analysis and performance of a hybrid multiple access scheme: IDMA/CDMA
    Xiong, Xingzhong
    Hu, Jianhao
    Yang, Feng
    Ling, Xiang
    [J]. COMPEL-THE INTERNATIONAL JOURNAL FOR COMPUTATION AND MATHEMATICS IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2010, 29 (02) : 431 - 444
  • [44] PERFORMANCE ANALYSIS OF A COMBINED RANDOM-RESERVATION ACCESS SCHEME
    WANG, XY
    KANIYIL, J
    ONOZATO, Y
    JIN, L
    SHIMAMOTO, S
    NOGUCHI, S
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1991, 39 (04) : 478 - 481
  • [45] Performance Analysis of an Access Scheme Based on Exhaustive Polling for WBAN
    Gomes, Manoel Pontes
    Motoyama, Shusaburo
    [J]. 2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2015,
  • [46] PERFORMANCE ANALYSIS OF AN ACCESS SCHEME BASED ON WEIGHTED POLLING FOR WBAN
    Gomes, Manoel Pontes
    Motoyama, Shusaburo
    [J]. 2015 IEEE 28TH INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS (CBMS), 2015, : 157 - 162
  • [47] A new packet scheduling algorithm for access points in crowded WLANs
    Yao, Yi
    Sheng, Bo
    Mi, Ningfang
    [J]. AD HOC NETWORKS, 2016, 36 : 100 - 110
  • [48] Enhancement of DRPE performance with a novel scheme based on new RAC: Principle, security analysis and FPGA implementation
    Neji, N.
    Jridi, M.
    Alfalou, A.
    Masmoudi, N.
    [J]. OPTICS COMMUNICATIONS, 2016, 360 : 73 - 82
  • [49] A First-Round-Bye Based Priority Scheme for WLANs with Two Access Categories
    Mao, Yiwei
    Shen, Lianfeng
    [J]. 2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,
  • [50] Handoff Performance Enhancement Scheme for Multi-Interface Enterprise WLANs
    Jeong, Jae-Pil
    Park, Young Deok
    Suh, Young-Joo
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2013,