Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography

被引:0
|
作者
Namal, Suneth [1 ]
Georgantas, Konstantinos [2 ]
Gurtov, Andrei [1 ]
机构
[1] Univ Oulu, Ctr Wireless Commun, SF-90100 Oulu, Finland
[2] Helsinki Inst Informat Technol, Helsinki, Finland
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Local Area Networks (WLANs) have experienced a significant growth during the last decade due to ever emerging and heavy resource demanding applications. Widely used IEEE 802.11 may unexpectedly require long durations in association compared to what Voice over IP (VoIP), Video on Demand (VoD) and other real-time applications can tolerate. In this paper, we implement HIP-WPA; a novel approach of Fast Initial Authentication (FIA) which is a combination of Host Identity Protocol Diet EXchange (HIP-DEX) with some features of Wi-Fi Protected Access (WPA) technology. This approach provides the necessary IP layer elevated security mechanisms in order to face the challenges of fast authentication in WLANs. HIP-DEX introduces a radically new way of authenticating hosts by using Elliptic Curve Cryptography (ECC) only with two message exchanges and therefore improves the authentication delay by 300% compared to WPA2. Thus, this is an effective solution to be used with any type of real-time application for intra-network (Basic Service Set (BSS) transitions) and inter-network (Extended Service Set (ESS) transitions) handovers.
引用
收藏
页码:1830 / 1835
页数:6
相关论文
共 50 条
  • [41] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [42] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    Journal of Systems Architecture, 2022, 133
  • [43] A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography
    Sadhukhan, Dipanwita
    Ray, Sangram
    Obaidat, Mohammad S.
    Dasgupta, Mou
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 114
  • [44] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [45] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Chen, Yulei
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16009 - 16032
  • [46] Algorithm and implementation of elliptic curve public key cryptography
    Gong, Shu
    Liu, Wenjiang
    Rong, Mengtian
    Gaojishu Tongxin/High Technology Letters, 2004, 14 (03):
  • [47] Remote user authentication and key agreement for mobile client-server environments on elliptic curve cryptography
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5927 - 5943
  • [48] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Yulei Chen
    Jianhua Chen
    Multimedia Tools and Applications, 2023, 82 : 16009 - 16032
  • [49] A secure lightweight anonymous elliptic curve cryptography-based authentication and key agreement scheme for fog assisted-Internet of Things enabled networks
    Verma, Upendra
    Bhardwaj, Diwakar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [50] Distributed Key Management Based on Elliptic Curve Cryptography for Mobile Ad hoc Network
    Zhang Yuchen
    Liu Jing
    Wang Yadi
    Han Jihong
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 777 - 780