Flexible and fast security solution for wireless LAN

被引:2
|
作者
Badra, Mohamad [1 ]
Urien, Pascal [1 ]
Hajjeh, Ibrahim [2 ]
机构
[1] Ecole Natl Super Telecommun Bretagne, 46 Rue Barrault, F-75013 Paris, France
[2] Secur WG 17, Engn & Sci Res Grp, Passage Barrault, F-75013 Paris, France
关键词
Wireless LAN security; EAP authentication methods; TLS;
D O I
10.1016/j.pmcj.2006.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The great promise of wireless LAN will never be realized unless they have an appropriate security level. From this point of view, various researches have proposed many security protocols for wireless LAN. This is in order to handle WLAN security problems which are mostly due to the lack of physical protection in WLAN or because of the transmission on the radio link. In this paper, we propose a security protocol named FFTLS (flexible and fast transport layer security), an EAP authentication method that enables secure communication between a client and an authentication server in a powerful and flexible way. Unlike existing EAP authentication methods, FFTLS protocol has the ability to combine between shared secrets and certificate-based infrastructures and to natively ensure additional security services such as identity protection, non-repudiation and perfect forward secrecy. Moreover, it efficiently optimizes the computational time and the message flows needed to open secure sessions for both clients and authentication servers. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [21] A Wireless LAN Bridging Solution Based on Campus Network
    刘航
    毛玉明
    Journal of Electronic Science and Technology, 2005, (01) : 14 - 17
  • [22] Impact of Security Algorithms on Various Performance Metrics of Wireless LAN
    Bhatia, V.
    Gupta, D.
    Sinha, H. P.
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1459 - +
  • [23] A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security
    Rajeev Singh
    Teek Parval Sharma
    Wireless Personal Communications, 2014, 77 : 1145 - 1165
  • [24] Wireless LAN Security Management with Location Detection Capability in Hospitals
    Tanaka, K.
    Atarashi, H.
    Yamaguchi, I.
    Watanabe, H.
    Yamamoto, R.
    Ohe, K.
    METHODS OF INFORMATION IN MEDICINE, 2012, 51 (03) : 221 - 228
  • [25] Wireless LAN Security Enhancement through Trusted Computing Technology
    She, Xinping
    Xu, Jianming
    APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 986 - +
  • [26] A WIRELESS-LAN SECURITY MODEL BASED ON COMPUTER IMMUNOLOGY
    Chang, Zhuo
    He, Qiang
    Zhao, Peng-Yuan
    Liu, Jin-Song
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2054 - 2057
  • [27] A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security
    Singh, Rajeev
    Sharma, Teek Parval
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (02) : 1145 - 1165
  • [28] Towards formal analysis of wireless LAN security with MIS protocol
    You, Ilsun
    Hori, Yoshiaki
    Sakurai, Kouichi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2011, 7 (02) : 112 - 120
  • [29] Security algorithms in wireless LAN: Proprietary or non-Proprietary
    Bakirdan, A
    Qaddour, J
    Jalozie, IK
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1425 - 1429
  • [30] A policy-based approach to Wireless LAN security management
    Lapiotis, George
    Kim, Byungsuk
    Das, Subir
    Anjum, Farooq
    2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - SECURECOMM, 2005, : 174 - 182