Supporting secure authentication and privacy in wireless computing

被引:0
|
作者
Hong, Seong-Pyo [1 ]
Lee, Joon [1 ]
机构
[1] Chosun Univ, Dept Comp Engn, Kwangju, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IEEE 802.11 standard for wireless LAN communications introduced the Wired Equivalent Privacy(WEP) protocol in an attempt to bring the security level of wireless systems closer to that of wired ones. Unfortunately, WEP falls short of accomplishing its security goals. Despite employing the well-known and believed-secure RC4 cipher, WEP contains several major security flaws. The flaws give rise to a number of attacks, both passive and active, that allow eavesdropping on, and tampering with, wireless transmissions. The IEEE 802.1x framework, what was known to have improved the IEEE 802.11b's weakness in user authentication, is a port-based authentication protocol. The IEEE 802.1x does not specify an authentication method, although the most common approach for WLANs is EAP, which is a framework for a variety of authentication methods. However, the IEEE 802.1x is also vulnerable to Denial of service and session highjacking attacks due to the lack of AP authentication and encryption mechanism. In this paper, we propose a Wireless LAN secure system that offers secure encrypted communication and user authentications. The purpose of the WLAN secure system that this study suggests is to improve the weakness in security of IEEE 802.1x and to guarantee a secure encrypted communication. The proposed system does not allow any faking of the identity by performing a thorough mutual authentication to all associated objects. Furthermore, it provides an integrity service by encrypting EAP-SUCCESS messages with distributed a new shared-key through the key distribution mechanism when an authentication process is executed, and securing the encrypted communication by using the 128 bit-length key.
引用
收藏
页码:594 / +
页数:2
相关论文
共 50 条
  • [41] A Secure Mutual authentication approach to fog computing environment
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    COMPUTERS & SECURITY, 2021, 111
  • [42] Secure User Authentication in Cloud Computing Management Interfaces
    Soares, Liliana F. B.
    Fernandes, Diogo A. B.
    Freire, Mario M.
    Inacio, Pedro R. M.
    2013 IEEE 32ND INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2013,
  • [43] Secure fingerprint authentication system on an untrusted computing environment
    Chung, Y
    Moon, D
    Kim, T
    Pan, S
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 299 - 310
  • [44] Classifying the Security Level of User Authentication for Secure Computing
    Shin, Jong-Whoi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (10): : 40 - 43
  • [45] An improved and provably secure privacy preserving authentication protocol for SIP
    Shehzad Ashraf Chaudhry
    Husnain Naqvi
    Muhammad Sher
    Mohammad Sabzinejad Farash
    Mahmood Ul Hassan
    Peer-to-Peer Networking and Applications, 2017, 10 : 1 - 15
  • [46] Secure and privacy preserving data processing support for active authentication
    Yan Sun
    Shambhu Upadhyaya
    Information Systems Frontiers, 2015, 17 : 1007 - 1015
  • [47] An improved and provably secure privacy preserving authentication protocol for SIP
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Sher, Muhammad
    Farash, Mohammad Sabzinejad
    ul Hassan, Mahmood
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 1 - 15
  • [48] Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
    Sy, Bon
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5376 : 143 - 154
  • [49] Secure and privacy preserving data processing support for active authentication
    Sun, Yan
    Upadhyaya, Shambhu
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (05) : 1007 - 1015
  • [50] An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET
    Khan, Safiullah
    Raza, Ali
    Hwang, Seong Oun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 3703 - 3719