Supporting secure authentication and privacy in wireless computing

被引:0
|
作者
Hong, Seong-Pyo [1 ]
Lee, Joon [1 ]
机构
[1] Chosun Univ, Dept Comp Engn, Kwangju, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IEEE 802.11 standard for wireless LAN communications introduced the Wired Equivalent Privacy(WEP) protocol in an attempt to bring the security level of wireless systems closer to that of wired ones. Unfortunately, WEP falls short of accomplishing its security goals. Despite employing the well-known and believed-secure RC4 cipher, WEP contains several major security flaws. The flaws give rise to a number of attacks, both passive and active, that allow eavesdropping on, and tampering with, wireless transmissions. The IEEE 802.1x framework, what was known to have improved the IEEE 802.11b's weakness in user authentication, is a port-based authentication protocol. The IEEE 802.1x does not specify an authentication method, although the most common approach for WLANs is EAP, which is a framework for a variety of authentication methods. However, the IEEE 802.1x is also vulnerable to Denial of service and session highjacking attacks due to the lack of AP authentication and encryption mechanism. In this paper, we propose a Wireless LAN secure system that offers secure encrypted communication and user authentications. The purpose of the WLAN secure system that this study suggests is to improve the weakness in security of IEEE 802.1x and to guarantee a secure encrypted communication. The proposed system does not allow any faking of the identity by performing a thorough mutual authentication to all associated objects. Furthermore, it provides an integrity service by encrypting EAP-SUCCESS messages with distributed a new shared-key through the key distribution mechanism when an authentication process is executed, and securing the encrypted communication by using the 128 bit-length key.
引用
收藏
页码:594 / +
页数:2
相关论文
共 50 条
  • [1] Secure and Privacy Enhanced Authentication Framework for Cloud Computing
    Patel, Subhash Chandra
    Singh, Ravi Shankar
    Jaiswal, Sumit
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1631 - 1634
  • [2] An efficient authentication protocol supporting privacy in mobile computing environments
    Park, SY
    Han, MS
    Eom, YI
    HSNMC 2002: 5TH IEEE INTERNATIONAL CONFERENCE ON HIGH SPEED NETWORKS AND MULTIMEDIA COMMUNICATIONS, 2002, : 332 - 334
  • [3] A secure and privacy-preserving lightweight authentication protocol for wireless communications
    Kamil I.
    Olakanmi O.
    Ogundoyin S.O.
    Ogundoyin, Sunday Oyinlola (honsybee@yahoo.com), 2017, Bellwether Publishing, Ltd. (26): : 287 - 304
  • [4] On privacy in secure biometric authentication systems
    Ignatenko, Tanya
    Willems, Frans
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 121 - +
  • [5] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Xie, Qi
    Li, Keheng
    Tan, Xiao
    Han, Lidong
    Tang, Wen
    Hu, Bin
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [6] A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
    Qi Xie
    Keheng Li
    Xiao Tan
    Lidong Han
    Wen Tang
    Bin Hu
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [8] A Secure Privacy-Preserving Mutual Authentication Scheme for Publish-Subscribe Fog Computing
    Salem, Fatty M.
    2018 14TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2018, : 213 - 218
  • [9] Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
    Patwary, Abdullah Al-Noman
    Naha, Ranesh Kumar
    Garg, Saurabh
    Battula, Sudheer Kumar
    Patwary, Md Anwarul Kaium
    Aghasian, Erfan
    Amin, Muhammad Bilal
    Mahanti, Aniket
    Gong, Mingwei
    ELECTRONICS, 2021, 10 (10)
  • [10] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,