Supporting secure authentication and privacy in wireless computing

被引:0
|
作者
Hong, Seong-Pyo [1 ]
Lee, Joon [1 ]
机构
[1] Chosun Univ, Dept Comp Engn, Kwangju, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IEEE 802.11 standard for wireless LAN communications introduced the Wired Equivalent Privacy(WEP) protocol in an attempt to bring the security level of wireless systems closer to that of wired ones. Unfortunately, WEP falls short of accomplishing its security goals. Despite employing the well-known and believed-secure RC4 cipher, WEP contains several major security flaws. The flaws give rise to a number of attacks, both passive and active, that allow eavesdropping on, and tampering with, wireless transmissions. The IEEE 802.1x framework, what was known to have improved the IEEE 802.11b's weakness in user authentication, is a port-based authentication protocol. The IEEE 802.1x does not specify an authentication method, although the most common approach for WLANs is EAP, which is a framework for a variety of authentication methods. However, the IEEE 802.1x is also vulnerable to Denial of service and session highjacking attacks due to the lack of AP authentication and encryption mechanism. In this paper, we propose a Wireless LAN secure system that offers secure encrypted communication and user authentications. The purpose of the WLAN secure system that this study suggests is to improve the weakness in security of IEEE 802.1x and to guarantee a secure encrypted communication. The proposed system does not allow any faking of the identity by performing a thorough mutual authentication to all associated objects. Furthermore, it provides an integrity service by encrypting EAP-SUCCESS messages with distributed a new shared-key through the key distribution mechanism when an authentication process is executed, and securing the encrypted communication by using the 128 bit-length key.
引用
收藏
页码:594 / +
页数:2
相关论文
共 50 条
  • [31] Supporting secure collaborative computing in grid environments
    Zeng, QH
    Huang, CQ
    Chen, DR
    Hu, HL
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 413 - 418
  • [32] Privacy Preserving Three-factor Authentication Protocol for Secure Message Forwarding in Wireless Body Area Networks
    Nyangaresi, Vincent Omollo
    AD HOC NETWORKS, 2023, 142
  • [33] CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving
    Xie, Yong
    Zhang, Songsong
    Li, Xiang
    Li, Yanggui
    Chai, Yuan
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [34] A secure wireless LAN system retaining privacy
    Komori, T
    Saito, T
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 370 - 375
  • [35] Secure Biometric-Based Authentication for Cloud Computing
    Wong, Kok-Seng
    Kim, Myung Ho
    CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2012, 2013, 367 : 86 - 101
  • [36] Privacy Protection Smartcard Authentication Scheme in Cloud Computing
    FAN Kai
    DENG Hai
    LI Hui
    YANG Yintang
    ChineseJournalofElectronics, 2018, 27 (01) : 41 - 45
  • [37] Trusted Computing to Increase Security and Privacy in eID Authentication
    Vossaert, Jan
    Lapon, Jorn
    De Decker, Bart
    Naessens, Vincent
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 485 - 492
  • [38] An Efficient and Privacy Protection Authentication Protocol for Edge Computing
    Luo, Yi
    Hu, Houpeng
    Qian, Bin
    Gao, Zhenghao
    Xiao, Yong
    Ou, Jiaxiang
    He, Peilin
    Journal of Network Intelligence, 2022, 7 (04): : 1032 - 1046
  • [39] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [40] ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING
    Jiang, Rui
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (04): : 1700 - 1724