Skip to main content

Investigating Authentication Mechanisms for Wireless Mobile Network

  • Conference paper
Book cover Ubiquitous Intelligence and Computing (UIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Included in the following conference series:

  • 620 Accesses

Abstract

As the portable devices are becoming popular, the demand for ubiquitous Internet access services has grown extremely. However the increasing demand for ubiquitous services imposes more security threats to communications due to open mediums in wireless networks. The further widespread deployment of Wireless IP networks, however, depends on whether secure networking can be achieved. We propose an efficient authentication framework for wireless mobile network, which is based on one-time password (OTP) mechanism. Further we have simulated the implementation of proposed scheme and EAP-TLS and analyzed the performance in terms of various performance metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Institute of Electrical and Electronics Engineers: Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements Part 11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11-2003 (2003)

    Google Scholar 

  2. IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std 802.1X-2004 (December 2004)

    Google Scholar 

  3. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP), IETF RFC 3748 (June 2004)

    Google Scholar 

  4. IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Telecommunications and information ex-change between systems - Local and metropolitan area networks - Specific requirements Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications (April 2004)

    Google Scholar 

  5. Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol, IETF RFC 2716 (October 1999)

    Google Scholar 

  6. Gast, M.: 802. 11 Wireless Networks - The Definitive Guide. O’Reilly, Sebastopol (2002)

    Google Scholar 

  7. Baek, K.H., Smith, S.W., Kotz, D.: A Survey of WPA and 802.11i RSN Authentication Protocols, Dartmouth College Computer Science, Technical Report TR2004-524 (November 2004)

    Google Scholar 

  8. Potter, B., Fleck, B.: 802. 11 Security. O’Reilly, Sebastopol (2002)

    Google Scholar 

  9. Edney, J., Arbaugh, W.A.: Real 802.11 Security - Wi-Fi Protected Access and 802.11i. Addison-Wesley, Reading (2003)

    Google Scholar 

  10. Lamport, L.: Password Authentication with insecure communication. Communications of the ACM 24(11), 722–770 (1981)

    Article  MathSciNet  Google Scholar 

  11. Haller, N.: The S/KEY One-Time Password System. In: Proc. of the Symposium on Network and Distributed Systems Security, Internet Society, CA, USA (February 1994)

    Google Scholar 

  12. Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System, IETF RFC 2289 (February 1998)

    Google Scholar 

  13. Blunk, L., Vollbrecht, J., Aboba, B.: The One Time Password (OTP) and Generic Token Card Authentication Protocols, Internet draft <draft-ietf-eap-otp-00.txt>

    Google Scholar 

  14. OPNET Modeler Simulation Software, http://www.opnet.com

  15. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)

    Article  Google Scholar 

  16. Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proc. of the Tenth Annual ACM Symposium on Principles of Distributed Computing, pp. 201–216 (August 1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vaidya, B., Kim, Y., Kim, EK., Han, S. (2006). Investigating Authentication Mechanisms for Wireless Mobile Network. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_92

Download citation

  • DOI: https://doi.org/10.1007/11833529_92

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38091-7

  • Online ISBN: 978-3-540-38092-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics