ADVANCED ENCRYPTION AND EXTENDED AUTHENTICATION FOR WIRELESS LAN
DOI:
https://doi.org/10.22159/ajpcr.2017.v10s1.19987Keywords:
WLAN, WEP, 80211, WPA, WPA2, EAP, RADIUS, RC4, AES, authenticationAbstract
Wireless networking technology is becoming increasingly popular but, at the same time, has introduced many security issues. WEP standards are followed in WLANs for providing security. But WEP is fatally crippled by the fact that WEP keys are the same for all users, all sessions and never changes and its poor implementation of the RC4 encryption scheme. The authentication mechanism is based on a simple challenge-response protocol. The main problem with the previously used method was same key was used for both encryption and authentication. But the proposed authentication is by means of certificates using Extensible Authentication Protocol and a session key is transferred after successful authentication between mobile node and server. This session key is then used for encrypting messages using Advanced Encryption Standard between mobile node and server.
Downloads
References
802.1 working group home page, http://grouper.ieee.org/groups/802/1/index.html.
IEEE Standard 802.11-1999 – Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications.
IEEE Std 802.1X-2001, IEEE Standard for Local and Metropolitan Area Networks, Port-based Network Access Control,†Oct. 2001.
L. Blunk and J. Vollbrecht, RFC2284, PPP Extensible Authentication Protocol (EAP), IETF, March 1998.
The Limits on Wireless Security: 802.11 in early 2002 by James Voorhees,January30,2002, http://rr.sans.org/wireless/limits.php.
P.Prasithasanagre, P.Krishnamurthy. Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANS. IEEE GLOB ECOM 2003.
S. Fluhrer, I. Mantin, and A. Shamir,Weaknesses in the Key Scheduling Algorithm of RC4, Eighth Annual Workshop on Selected Areas in Cyptography,August 2001.
R. Anderson, E. Biham, and L. Udsen, Serpent: A Proposal for the Advanced Encryption Standard,†NIST AES Proposal, June 98.
R.Martin-Lopez,A.F.Gomez, F.Bernal,â€Secure three-party key distribution protocol for fast network access in EAP-based wireless networks†October 2010.
M.M. Eissa, ,Ihab A. Ali, K.M. Abdel-Latif,Wi-Fi protected access for secure power network protection scheme, International Journal of Electrical Power & Energy Systems, March 2013.
J.A.R. Pacheco de Carvalhoa, bH. Veiga,C.F. Ribeiro Pacheco,A.D. Reis,Performance Evaluation of Laboratory Wi-fi Ieee 802.11a Wpa Point-to-multipoint Links, CENTERIS 2013 - Conference on ENTERprise Information Systems,2013.
Poonam Jindal, ,Brahmjit Singh,RC4 Encryption-A Literature Survey, Proceedings of the International Conference on Information and Communication Technologies, ICICT 2014, 3-5 December 2014.
Ankush Rai, Dynamic Data Flow Based Spatial Sorting Method for GPUs: Software Based Autonomous Parallelization, Recent Trends in Parallel Computing, Volume 1, Issue 1, 2014.
Ankush Rai,Shell Implementation of Neural Net Over The Unix Environment for File Management: A Step Towards Automated Operating System, Journal of Operating Systems, 2014, Vol 1, Issue 2.
Rai, Ankush. "Shell implementation of neural net over the UNIX environment for file management: A step towards automated operating system." Journal of Operating Systems Development & Trends 1.2 (2014): 10-14.
Rai, Ankush. "Automation of Community from Cloud Computing." Journal of Advances in Shell Programming 1.1 (2014): 21-23.
Rai, Ankush. "Dynamic Pagination for Efficient Memory Management Over Distributed Computational Architecture for Swarm Robotics." Journal of Advances in Shell Programming 1.2 (2014): 1-4.
Rai, Ankush, Sakkaravarthi Ramanathan, and R. Jagadeesh Kannan. "Quasi Opportunistic Supercomputing for Geospatial Socially Networked Mobile Devices." Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2016 IEEE 25th International Conference on. IEEE, 2016.
Published
How to Cite
Issue
Section
The publication is licensed under CC By and is open access. Copyright is with author and allowed to retain publishing rights without restrictions.