ADVANCED ENCRYPTION AND EXTENDED AUTHENTICATION FOR WIRELESS LAN

Authors

  • EMIL SELVAN GSR Department of Computer Science and Engineering,Thiagarajar College of Engineering, Madurai
  • GAYATHRI N Department of Computer Science and Engineering,Thiagarajar College of Engineering, Madurai
  • RAKESH KUMAR S Bannari Amman Institute of Technology, Sathyamangalam
  • ANKUSH RAI School of Computing Science & Engineering, VIT University, Chennai
  • JAGADEESH KANNAN R School of Computing Science & Engineering, VIT University, Chennai

DOI:

https://doi.org/10.22159/ajpcr.2017.v10s1.19987

Keywords:

WLAN, WEP, 80211, WPA, WPA2, EAP, RADIUS, RC4, AES, authentication

Abstract

Wireless networking technology is becoming increasingly popular but, at the same time, has introduced many security issues. WEP standards are followed in WLANs for providing security. But WEP is fatally crippled by the fact that WEP keys are the same for all users, all sessions and never changes and its poor implementation of the RC4 encryption scheme. The authentication mechanism is based on a  simple challenge-response protocol. The main problem with the previously used method was same key was used for both encryption and authentication. But the proposed authentication is by means of certificates using Extensible Authentication Protocol and a session key is transferred after successful authentication between mobile node and server. This session key is then used for encrypting messages using Advanced Encryption Standard between mobile node and server.

Downloads

Download data is not yet available.

References

802.1 working group home page, http://grouper.ieee.org/groups/802/1/index.html.

IEEE Standard 802.11-1999 – Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications.

IEEE Std 802.1X-2001, IEEE Standard for Local and Metropolitan Area Networks, Port-based Network Access Control,†Oct. 2001.

L. Blunk and J. Vollbrecht, RFC2284, PPP Extensible Authentication Protocol (EAP), IETF, March 1998.

The Limits on Wireless Security: 802.11 in early 2002 by James Voorhees,January30,2002, http://rr.sans.org/wireless/limits.php.

P.Prasithasanagre, P.Krishnamurthy. Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANS. IEEE GLOB ECOM 2003.

S. Fluhrer, I. Mantin, and A. Shamir,Weaknesses in the Key Scheduling Algorithm of RC4, Eighth Annual Workshop on Selected Areas in Cyptography,August 2001.

R. Anderson, E. Biham, and L. Udsen, Serpent: A Proposal for the Advanced Encryption Standard,†NIST AES Proposal, June 98.

R.Martin-Lopez,A.F.Gomez, F.Bernal,â€Secure three-party key distribution protocol for fast network access in EAP-based wireless networks†October 2010.

M.M. Eissa, ,Ihab A. Ali, K.M. Abdel-Latif,Wi-Fi protected access for secure power network protection scheme, International Journal of Electrical Power & Energy Systems, March 2013.

J.A.R. Pacheco de Carvalhoa, bH. Veiga,C.F. Ribeiro Pacheco,A.D. Reis,Performance Evaluation of Laboratory Wi-fi Ieee 802.11a Wpa Point-to-multipoint Links, CENTERIS 2013 - Conference on ENTERprise Information Systems,2013.

Poonam Jindal, ,Brahmjit Singh,RC4 Encryption-A Literature Survey, Proceedings of the International Conference on Information and Communication Technologies, ICICT 2014, 3-5 December 2014.

Ankush Rai, Dynamic Data Flow Based Spatial Sorting Method for GPUs: Software Based Autonomous Parallelization, Recent Trends in Parallel Computing, Volume 1, Issue 1, 2014.

Ankush Rai,Shell Implementation of Neural Net Over The Unix Environment for File Management: A Step Towards Automated Operating System, Journal of Operating Systems, 2014, Vol 1, Issue 2.

Rai, Ankush. "Shell implementation of neural net over the UNIX environment for file management: A step towards automated operating system." Journal of Operating Systems Development & Trends 1.2 (2014): 10-14.

Rai, Ankush. "Automation of Community from Cloud Computing." Journal of Advances in Shell Programming 1.1 (2014): 21-23.

Rai, Ankush. "Dynamic Pagination for Efficient Memory Management Over Distributed Computational Architecture for Swarm Robotics." Journal of Advances in Shell Programming 1.2 (2014): 1-4.

Rai, Ankush, Sakkaravarthi Ramanathan, and R. Jagadeesh Kannan. "Quasi Opportunistic Supercomputing for Geospatial Socially Networked Mobile Devices." Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2016 IEEE 25th International Conference on. IEEE, 2016.

Published

01-04-2017

How to Cite

GSR, E. S., G. N, R. K. S, A. RAI, and J. K. R. “ADVANCED ENCRYPTION AND EXTENDED AUTHENTICATION FOR WIRELESS LAN”. Asian Journal of Pharmaceutical and Clinical Research, vol. 10, no. 13, Apr. 2017, pp. 441-4, doi:10.22159/ajpcr.2017.v10s1.19987.

Issue

Section

Original Article(s)

Most read articles by the same author(s)

1 2 3 4 > >>