Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography

被引:0
|
作者
Namal, Suneth [1 ]
Georgantas, Konstantinos [2 ]
Gurtov, Andrei [1 ]
机构
[1] Univ Oulu, Ctr Wireless Commun, SF-90100 Oulu, Finland
[2] Helsinki Inst Informat Technol, Helsinki, Finland
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Local Area Networks (WLANs) have experienced a significant growth during the last decade due to ever emerging and heavy resource demanding applications. Widely used IEEE 802.11 may unexpectedly require long durations in association compared to what Voice over IP (VoIP), Video on Demand (VoD) and other real-time applications can tolerate. In this paper, we implement HIP-WPA; a novel approach of Fast Initial Authentication (FIA) which is a combination of Host Identity Protocol Diet EXchange (HIP-DEX) with some features of Wi-Fi Protected Access (WPA) technology. This approach provides the necessary IP layer elevated security mechanisms in order to face the challenges of fast authentication in WLANs. HIP-DEX introduces a radically new way of authenticating hosts by using Elliptic Curve Cryptography (ECC) only with two message exchanges and therefore improves the authentication delay by 300% compared to WPA2. Thus, this is an effective solution to be used with any type of real-time application for intra-network (Basic Service Set (BSS) transitions) and inter-network (Extended Service Set (ESS) transitions) handovers.
引用
收藏
页码:1830 / 1835
页数:6
相关论文
共 50 条
  • [31] An improvement on a three-party authentication key exchange protocol using elliptic curve cryptography
    Tan, Zuowen
    Journal of Convergence Information Technology, 2010, 5 (04)
  • [32] A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Zhi-Wei
    Chen, Shun-Der
    Lai, Yan-Ming
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (01) : 96 - 117
  • [33] A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks
    Boumerzoug, Hayette
    Bensaber, Boucif Amar
    Biskri, Ismail
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06): : 1831 - 1847
  • [34] A Roaming Authentication Protocol based on Elliptic Curve Cryptography in IOV
    Shen Cen
    Mu Haibing
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 400 - 404
  • [35] Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
    Rathee, Geetanjali
    Saini, Hemraj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (01) : 42 - 52
  • [36] Elliptic Curve Cryptography on E-passport Authentication Protocol
    Saoudi, Safa
    Yousfi, Souheib
    Robbana, Riadh
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1253 - 1260
  • [37] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [38] Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things
    Shen Guicheng
    Yu Zhen
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 452 - 455
  • [39] A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography
    Alshudukhi, Jalawi Sulaiman
    Al-Mekhlafi, Zeyad Ghaleb
    Mohammed, Badiea Abdulkarem
    IEEE ACCESS, 2021, 9 : 15633 - 15642
  • [40] Lightweight elliptic curve cryptography accelerator for internet of things applications
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    AD HOC NETWORKS, 2020, 103