The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Heterogeneous Wireless Network convergence has attracted the attention of researchers. Authentication and key agreement becomes more and more important in this research field. EAP-AKA (Extensible Authentication Protocol Authentication and Key Agreement) is the authentication and key agreement protocol of 3G-WLAN interworking. In this paper, it introduces the procedure of EAP-AKA protocol and analyses...
In this paper, we propose a novel protocol suite for roaming WLAN devices. It supports authentication, key agreement, and secure payment between roaming devices and network operators. This is achieved with the help of an integrated tick payment scheme. Our protocol suite allows operators to quickly change tariffs depending on current demand and allows users to choose between different operators and...
A novel and efficient WLAN fast authentication Protocol (FWAI) is proposed and compared with IEEE 802111i and WAPI about their security and performance. Then FWAI is analyzed with BAN-like logic on the security. Results show that FWAI achieves its security properties and there are no security vulnerabilities or redundancy in it.
TLS (Transport Layer Security) is the de facto standard that provides end-to-end secure communications with mutual authentication between two communicating entities. TLS has been designed to run from end to end, in which case intermediate hosts are considered as man in the middle attacks. Recently, TLS is widely deployed by applications and networks to exchange keys between more than two entities,...
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to deploy, requiring no out-of-band key exchange or prior trust relationships. However, such networks are vulnerable to a variety of threats including the evil twin attack where an adversary clones a client's previously-used access...
The authentication process of wireless local area network authentication and privacy infrastructure, namely, WAI protocol, is researched and analyzed, and the security analysis is made to its the key-agreement process by using CK model. The analysis shows that: WAI can realize security attributes such as mutual key-control, key confirmation and so on, and it can also statisfy the secure goal of wireless...
3G-WLAN interworking introduces new security challenges and problems. Designing and deploying a scalable and efficient authentication protocol for various network providers and millions of users is quite challenging. In this paper we propose a novel protocol that enables flexible and efficient authentication while respecting the characteristics of 3G-WLAN integrated networks. It realizes a localized...
Access control based on authentication and authorization is essential to design a good wireless local area network (WLAN). This paper introduces several key authentication technologies of WLAN, including open system authentication and shared key authentication used in IEEE 802.11b standard, EAP used in IEEE802.1x and WAI used in WAPI. Different superiorities and deficiencies have been presented in...
EAP-AKA is a secure access protocol in the 3GPP WLAN-3G interconnecting scheme in which 3G user and 3G network are bidirectional authenticated, however the middle-positioned WLAN access network is not authenticated and the 3G-UE master key updating strategy is not proposed. A new protocol which utilizes ID-based encryption and ticket technology to implement master key updating and access network authentication...
In this paper, we present a simple public key security protocol, which uses the cocyclic jacket matries and their properties. The proposed protocol can be easily applied to be implemented in the wireless rural network.
This paper introduces the working principle of IEEE 802.1x protocol and Extensible Authentication Protocol EAP-TLS in the wireless local area network. There are some safety defects by analysis of the EAP-TLS protocol. On this basis, make an improvement to the EAP-TLS protocol, and give concrete realization of the process, to set up a WLAN authentication system with higher safety.
Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy...
Due to the prevalence of insecure open 802.11 access points, it is currently easy for a malicious party to launch a variety of attacks such as eavesdropping and data injection. In this paper, we consider a particular threat called the evil twin attack, which occurs when an adversary clones an open access point and exploits common automatic access point selection techniques to trick a wireless client...
Authentication is a key requirement in security of integrated wireless networks. A Mobile Node (MN) requires to be re-authenticated whenever it performs vertical handoff in integrated wireless networks. The re-authentication causes delay in communication. If MN is not re-authenticated, it causes an even more serious problem of unauthorized entry in a network. In order to solve this problem, we have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.