Supporting secure authentication and privacy in wireless computing

被引:0
|
作者
Hong, Seong-Pyo [1 ]
Lee, Joon [1 ]
机构
[1] Chosun Univ, Dept Comp Engn, Kwangju, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IEEE 802.11 standard for wireless LAN communications introduced the Wired Equivalent Privacy(WEP) protocol in an attempt to bring the security level of wireless systems closer to that of wired ones. Unfortunately, WEP falls short of accomplishing its security goals. Despite employing the well-known and believed-secure RC4 cipher, WEP contains several major security flaws. The flaws give rise to a number of attacks, both passive and active, that allow eavesdropping on, and tampering with, wireless transmissions. The IEEE 802.1x framework, what was known to have improved the IEEE 802.11b's weakness in user authentication, is a port-based authentication protocol. The IEEE 802.1x does not specify an authentication method, although the most common approach for WLANs is EAP, which is a framework for a variety of authentication methods. However, the IEEE 802.1x is also vulnerable to Denial of service and session highjacking attacks due to the lack of AP authentication and encryption mechanism. In this paper, we propose a Wireless LAN secure system that offers secure encrypted communication and user authentications. The purpose of the WLAN secure system that this study suggests is to improve the weakness in security of IEEE 802.1x and to guarantee a secure encrypted communication. The proposed system does not allow any faking of the identity by performing a thorough mutual authentication to all associated objects. Furthermore, it provides an integrity service by encrypting EAP-SUCCESS messages with distributed a new shared-key through the key distribution mechanism when an authentication process is executed, and securing the encrypted communication by using the 128 bit-length key.
引用
收藏
页码:594 / +
页数:2
相关论文
共 50 条
  • [21] A Secure and Efficient Authentication Protocol in VANETs with Privacy Preservation
    Vorugunti, Chandra Sekhar
    Sarvabhatla, Mrudula
    PROCEEDINGS OF NINTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2013), 2014, 299 : 189 - 201
  • [22] Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
    Lee, Hyeong-Chan
    Eom, TaeYang
    Yi, Jeong Hyun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 421 - 426
  • [23] Secure SIP authentication scheme supporting lawful interception
    Pu, Qiong
    Wang, Jian
    Wu, Shuhua
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 340 - 350
  • [24] A Secure Authentication Protocol Supporting Efficient Handover for UAV
    Wen, Kang
    Wang, Shengbao
    Wu, Yixiao
    Wang, Jie
    Han, Lidong
    Xie, Qi
    MATHEMATICS, 2024, 12 (05)
  • [25] A Secure Authentication Scheme with Anonymity for Wireless Communications
    Wu, Chia-Chun
    Lee, Wei-Bin
    Tsaur, Woei-Jiunn
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (10) : 722 - 723
  • [26] A Secure Mutual Authentication Scheme for Wireless Communication
    Song, Jie
    Pan, Xiangyu
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 114 - 130
  • [27] Secure password authentication protocol in wireless networks
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 149 - +
  • [28] A Secure Authentication Mechanism for Wireless Sensor Networks
    Ali, Rifaqat
    Chandrakar, Preeti
    Obaidat, Mohammad S.
    Hsiao, Kuei-Fang
    Pal, Arup Kumar
    Islam, S. K. Hafizul
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2020, : 206 - 213
  • [29] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [30] Supporting Quality of Privacy (QoP) in pervasive computing
    Tentori, M
    Favela, J
    Gonzalez, VM
    Rodríguez, MD
    SIXTH MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, PROCEEDINGS, 2005, : 58 - 65