Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography

被引:0
|
作者
Namal, Suneth [1 ]
Georgantas, Konstantinos [2 ]
Gurtov, Andrei [1 ]
机构
[1] Univ Oulu, Ctr Wireless Commun, SF-90100 Oulu, Finland
[2] Helsinki Inst Informat Technol, Helsinki, Finland
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Local Area Networks (WLANs) have experienced a significant growth during the last decade due to ever emerging and heavy resource demanding applications. Widely used IEEE 802.11 may unexpectedly require long durations in association compared to what Voice over IP (VoIP), Video on Demand (VoD) and other real-time applications can tolerate. In this paper, we implement HIP-WPA; a novel approach of Fast Initial Authentication (FIA) which is a combination of Host Identity Protocol Diet EXchange (HIP-DEX) with some features of Wi-Fi Protected Access (WPA) technology. This approach provides the necessary IP layer elevated security mechanisms in order to face the challenges of fast authentication in WLANs. HIP-DEX introduces a radically new way of authenticating hosts by using Elliptic Curve Cryptography (ECC) only with two message exchanges and therefore improves the authentication delay by 300% compared to WPA2. Thus, this is an effective solution to be used with any type of real-time application for intra-network (Basic Service Set (BSS) transitions) and inter-network (Extended Service Set (ESS) transitions) handovers.
引用
收藏
页码:1830 / 1835
页数:6
相关论文
共 50 条
  • [21] Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
    He, Debiao
    Wang, Huaqun
    Khan, Muhammad Khurram
    Wang, Lina
    IET COMMUNICATIONS, 2016, 10 (14) : 1795 - 1802
  • [22] A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography
    Wu, Fan
    Xu, Lili
    Li, Xiong
    Kumari, Saru
    Karuppiah, Marimuthu
    Obaidat, Mohammad S.
    IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2830 - 2838
  • [23] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [24] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [25] Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
    Abdaoui, Abderrazak
    Erbad, Aiman
    Al-Ali, Abdulla Khalid
    Mohamed, Amr
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9987 - 9998
  • [26] Voter Authentication Using Modified Elliptic Curve Cryptography
    Sujatha, K.
    Rao, A. Arjuna
    Yejarla, Prathyusha
    Sruthi, K. J.
    SMART COMPUTING AND INFORMATICS, 2018, 77 : 497 - 504
  • [27] An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach
    Sen, Nilanjan
    APPLIED ALGORITHMS, 2014, 8321 : 110 - 121
  • [28] A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm
    Origines, Domingo V., Jr.
    Sison, Ariel M.
    Medina, Ruji P.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND BIG DATA (ICCBD 2019), 2019, : 73 - 80
  • [29] Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography
    Usman, Muhammad
    Amin, Rashid
    Aldabbas, Hamza
    Alouffi, Bader
    ELECTRONICS, 2022, 11 (07)
  • [30] Remote user authentication and key agreement for mobile client–server environments on elliptic curve cryptography
    Jiaqing Mo
    Zhongwang Hu
    Yuhua Lin
    The Journal of Supercomputing, 2018, 74 : 5927 - 5943