Implementation of security mechanism for adhoc wireless networks based on X.509 and IEEE 802.1X

被引:0
|
作者
Tung, Chia Hsing [1 ]
Chen, Yi Quan [1 ]
Chen, Zhi Mou [1 ]
Tsai, Shuoh Ren [1 ]
机构
[1] Natl Kaohsiung First Univ Sci & Technol, Dept Comp & Commun Engn, Kaohsiung, Taiwan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance both security and performance, we evaluate different Encryption/Decryption Algorithms suitable for Adhoc networks. We extend the 802.1X Inftastructure mode security mechanism by adding X509. We implement and test the prototype system.
引用
收藏
页码:562 / +
页数:2
相关论文
共 50 条
  • [21] IEEE 802.1x解决企业网认证难题
    王威
    煤炭技术, 2008, (03) : 166 - 167
  • [22] Design of WLAN secure system against weaknesses of the IEEE 802.1x
    Hong, Scong-pyo
    Park, Jong-an
    Han, Seung-jo
    Pyun, Jae-young
    Lee, Joon
    ADVANCES IN HYBRID INFORMATION TECHNOLOGY, 2007, 4413 : 617 - +
  • [23] 基于IEEE 802.1x的认证技术研究
    赵荣芳
    耿玉水
    刘敏
    电脑知识与技术, 2010, 6 (12) : 3118 - 3119
  • [24] Validating X.509 Certificates Based on Their Quality
    Wazan, Ahmad Samer
    Laborde, Romain
    Barrere, Francois
    Benzekri, Abdelmalek
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2055 - 2060
  • [25] Analysis of secure handover for IEEE 802.1X-based wireless Ad Hoc networks
    Fantacci, Romano
    Maccari, Leonardo
    Pecorella, Tommaso
    Frosali, Federico
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 21 - 29
  • [26] Comparison between DHCP-based and IEEE 802.1x network access control mechanisms
    Wang, JH
    Lee, TL
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 215 - 220
  • [27] An Enhanced Identity Authentication Security Access Control Model Based on 802.1x Protocol
    Chen, Han-Ying
    Liu, Xiao-Li
    FUZZY SYSTEMS AND DATA MINING II, 2016, 293 : 407 - 413
  • [28] Adaptation of IEEE 802.1X for secure session establishment between ethernet peers
    Saiz, Purificacion
    Matias, Jon
    Jacob, Eduardo
    Bustamante, Javier
    Astarloa, Armando
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 220 - +
  • [29] Extensible Authentication Protocol (EAP) and IEEE 802.1x: Tutorial and empirical experience
    Chen, JC
    Wang, YP
    IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (12) : S26 - S32
  • [30] IEEE 802.1x协议中申请者的实现
    刘少兵
    麦永浩
    周德新
    兵工自动化, 2004, (04) : 35 - 35