Implementation of security mechanism for adhoc wireless networks based on X.509 and IEEE 802.1X

被引:0
|
作者
Tung, Chia Hsing [1 ]
Chen, Yi Quan [1 ]
Chen, Zhi Mou [1 ]
Tsai, Shuoh Ren [1 ]
机构
[1] Natl Kaohsiung First Univ Sci & Technol, Dept Comp & Commun Engn, Kaohsiung, Taiwan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance both security and performance, we evaluate different Encryption/Decryption Algorithms suitable for Adhoc networks. We extend the 802.1X Inftastructure mode security mechanism by adding X509. We implement and test the prototype system.
引用
收藏
页码:562 / +
页数:2
相关论文
共 50 条
  • [1] SECURING WIRELESS LOCAL AREA NETWORKS BASED ON IEEE 802.1X AND X.509 CERTIFICATES
    Crainicu, Bogdan
    PROCEEDINGS OF THE EUROPEAN INTEGRATION: BETWEEN TRADITION AND MODERNITY, VOL 2, 2007, : 670 - 673
  • [2] Security Concepts Based on IEEE 802.1X for G.hn Broadband PLC Access Networks
    Hallak, George
    Frauenrath, Tobias
    Mengi, Anil
    2020 IEEE INTERNATIONAL SYMPOSIUM ON POWER LINE COMMUNICATIONS AND ITS APPLICATIONS (IEEE ISPLC), 2020,
  • [3] Improving the security of wireless LANs by managing 802.1x disassociation
    Ding, P
    Holliday, J
    Celik, A
    CCNC 2004: 1ST IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, PROCEEDINGS: CONSUMER NETWORKING: CLOSING THE DIGITAL DIVIDE, 2004, : 53 - 58
  • [4] The Research and Realization of IEEE 802.1X and Account
    Zhang Xiaodong
    Zhao Yumei
    Ma Yan
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 334 - +
  • [5] Wireless security gets a new sheriff and deputy - 802.1x and EAP
    Lantronix
    Electron. Des., 2008, 16 (20):
  • [6] Effects of the EAPOL, timers in IEEE 802.1X authentication
    Sung, Ya-Chin
    Lin, Yi-Bing
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (06) : 2276 - 2281
  • [7] Will IEEE 802.1X finally take off in 2008?
    Leavitt, Neal
    COMPUTER, 2008, 41 (03) : 12 - 15
  • [8] Comparative analysis of IEEE 802.1x authentication methods
    Akhlaq, Monis
    Aslam, Baber
    Khan, Muzammiil A.
    Jafri, M. Noman
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOL 3: ADVANCES IN COMMUNICATIONS, 2007, : 1 - +
  • [9] An efficient micromobility implementation for 802.1X WLANs
    Hecker, A
    Labiod, H
    2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2684 - 2688
  • [10] An efficient dynamic key based EAP authentication framework for future IEEE 802.1x Wireless LANs
    Dey, Biswanath
    Vishnu, S. S.
    Swarnkar, Om Satyam
    2018 2ND INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (ICDSP 2018), 2018, : 125 - 131