The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, with the rapid increase of WLAN-enabled mobile devices and the more widespread use of WLAN, it is increasingly important to have a more efficient initial link setup mechanism, and there is a demand for a faster access authentication method faster than the current IEEE 802.11i. In this paper, through experiments we observe that the authentication delay of 802.11i is intolerable under some...
Because of enormous complexity of security protocols and lack of efficient security protocol modeling method, how to evaluate the WLAN security protocols poses unique and formidable challenges. To address this issue, a universal and extensible simulation platform for WLAN security protocols is proposed. First, the architecture of the platform is presented, which provides a unified interface to extend...
Fast re-authentication schemes for mobile stations are essential during handover between access points in wireless local area networks. Although lots of research resources have been put into the reduction of re-authentication latency, these schemes developed so far seem to either suffer from heavy overhead or have weak security. This paper proposes a novel ticket-based approach to deal with the problem...
3G-WLAN interworking introduces new security challenges and problems. Designing and deploying a scalable and efficient authentication protocol for various network providers and millions of users is quite challenging. In this paper we propose a novel protocol that enables flexible and efficient authentication while respecting the characteristics of 3G-WLAN integrated networks. It realizes a localized...
Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy...
IEEE802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in IEEE802.11, IEEE introduced 802.1x for authentication and key management. IEEE802.1x is a port based network access control protocol that uses extensible authentication protocol (EAP) at the transport layer.IEEE802.1x defines authentication...
With the rapid development of the WLAN, the 802.11s mesh network is emerging. However, the security in the 802.11s mesh network is not well defined or specified, and there is no standard method to authenticate a mesh point that is creating a mesh link. In this paper, a solution is proposed for the authentication of mesh points in the infrastructure model. In this proposal, the 802.1X/EAP and neighbor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.