The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As demand for various multimedia applications with dissimilar quality of service rising quickly, provisioning of rapid and secure to the end clients is becoming a main challenge for the wireless network service suppliers. WLAN technologies are getting to be popular and the device is widely used everywhere the place these days, therefore a lot of issues are considered in the matter of wireless security...
Society becomes more and more electronic and many daily applications, like those of e-commerce, need a height level of security because of the sensitivity of the manipulated data. Cryptography is the main way to ensure security of data, such passwords, cards numbers, etc. However, the classical cryptography suffers from relevant problematic of secured key sharing. According to Shannon theory, a secured...
Wireless communication is known as key to global development. Wireless and mobile communication is gaining more importance in our life. Protecting information is one the aspects which we need to focus on the wireless networks. Universal mobile telecommunication system (UMTS) is evolution of the third generation mobile communication system. It was built on the success of global system for mobile communication...
Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standards are becoming increasingly popular in businesses, governments, educations, public and individual. However, when transmissions are broadcast over radio waves, interception and masquerading becomes trivial to anyone with a radio, and so there is a need to employ additional mechanisms to protect the communication. In this paper, we...
The convergence of third generation (3G) wide area wireless network and wireless local area network (WLAN) offers characteristics that complement each other perfectly. To provide secure 3G-WLAN convergence, extensible authentication protocol-authentication and key agreement (EAP-AKA) protocol, that has got many risk, is used. This paper elaborate risks in using EAP-AKA for 3G-WLAN convergence, proposes...
Recently, the problem of protecting privacy at link-layer is of great importance in wireless environments, mainly due to the fact that the wireless link layer is not protected by current technologies used in wireless networks. This leads to many potential threats to security and user privacy. Very recently, Lu et al. proposed an authentication scheme for wireless link-layer privacy which is based...
One of the key components of IEEE 802.11i authentication protocol to defend against various malicious attacks is its 4-way handshake scheme. However, since Message 1 in the handshake scheme has not been protected by the Message Integrity Code (MIC), the original 4-way handshake scheme specified by the IEEE standard is vulnerable to the Denial of Service (DoS) attacks and DoS flooding attacks. Several...
Users of public Wi-Fi networks risk being tricked into connecting to `evil twin' access points set up by attackers to launch man-in-the-middle attacks. We present a system which employs post hoc validation of an anonymous Diffie-Hellman key exchange undertaken as part of an 802.1X/EAP-TTLS network association process. Our system utilises an additional secure auxilliary channel to run a modified version...
It is the fact that wireless networks have become one of the most widely used communication systems in the world due to the wireless network's natures. However, at the same time providing secure communication for wireless networks has become one of the prime concerns. There are many ways to improve security issues, one of them, titled quantum cryptography, namely quantum key distribution (QKD), offers...
In this paper we introduce ASN.1 scripts, securely computing cryptographic keys-trees, in smart cards. Keys-trees are used by various protocols such as AKA or EAP that are going to be deployed in next generations of wireless networks (WLAN, WiMAX, EUTRAN..). They provide services such as fast re-authentication, handover management, or Mobile IP support. We propose a trusted computing architecture...
IEEE 802.11 wireless local area networks provide the ability to build a cost efficient network infrastructure that is flexible and mobile. This technology tried to provide mechanisms by which to secure the network, however, it failed to do so. The security mechanisms evolved from wired equivalent privacy (WEP) to Wi-Fi protected access (WPA), which introduced more enhancements to both encryption and...
There are some demonstrable reasons for customers who like use from wireless technology and this is clear because there are various benefits for using wireless technology. The contrast between wireless usage and security techniques growing, show that the security is not adequate enough for this data growing. Itpsilas obvious that the hackers are able to monitor the transmitted data and hack whatever...
In this paper, we identify a vulnerability of IEEE 802.11 wireless Mesh LANs in which a compromised mesh point can still receive data from other mesh points. Then we propose a new protocol that can counter this attack by considering the effective period of both the mesh points (MPs) when decide the lifetime of the key shared between them. We also amend 802.11s draft in order not to bring about a fundamental...
It is the fact that wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous research work to a new method of integrating...
It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In this paper, we shall extend our previous...
Wireless networks have become one of the most widely used communication systems in the world. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely quantum key distribution (QKD), offers the promise of unconditional security. In our paper, we shall extend our previous research work to a new method of integrating quantum cryptography...
Multicasting is an important business in the field of the wireless local area network (WLAN). The access point (AP) usually has to seed the same message to each station (STA) of a specific group, and the multicasting is one of the most efficient communication ways. To assure the validity of the entity and the privacy of the message, we should first solve the problem of the multicast key secure distribution...
The traditional security enforcement approach of network is employing cryptography and authentication scheme. However, we consider that the conventional view of security based on cryptography alone is not sufficient for the wireless LAN and Third-generation (3G) integration networks against malicious or non-malicious insertion of data from internal adversaries or faulty nodes. In this paper, we propose...
Handoff latency is a severe bottleneck impacting the service continuity for voice and multimedia applications in WLAN. IEEE 802.11k neighbor report defines the neighbor APs which are potential transition candidates for the roaming target. But the selection method for the roaming target AP is left undefined. Several schemes have been proposed for fast handoff with neighbor APpsilas information. However,...
With the rapid development of wireless communication, mobile users are able to manually switch their network interfaces to different types of networks. The IEEE 802.21 Draft Standard was proposed to integrate the Media Independent Handover (MIHs) between the wireless network interfaces, such as WiFi, WiMAX, 3 GPP, and 3GPP2. However, it may not hold the seamless roaming character and does not provide...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.