Skip to main content

Strong User Authentication in IEEE802.11 Wireless LAN

  • Conference paper
  • First Online:
Web and Communication Technologies and Internet-Related Social Issues — HSI 2003 (HSI 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2713))

Included in the following conference series:

Abstract

The authentication of the existing wireless LAN standard IEEE802.11b is not user authentication but it is device authentication also this have many vulnerabilities. As a result to complement the weak of IEEE802.11b authentication, the IEEE802.1x had developed in the sense of providing strong user authentication with appropriate mechanism. But this new mechanism do not perform AP (Access Point) authentication and there are also some weak points. For that reason in this paper we propose strong user authentication mechanism in IEEE802.11 wireless LAN environment. This mechanism is based on existing 802.1x and through TLS the user authentication is performed in all of wireless LAN components.

This Research was supported by SOREC(Software Research Center) of KOSEF in Chungnam National University. SOREC is a Regional Research Center Designated by Korea Science and Engineering Foundation(KOSEF).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tom Katygiannis, Les Owens, “Draft Wireless Network Security”, National Institute of Standards and Technology (NIST), 2002

    Google Scholar 

  2. “IEEE802.11b Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification”, IEEE Standard 802.11b, 1999

    Google Scholar 

  3. James T. Geier, Jim Geier, “Wireless LANs (2nd Edition)”, SAMS, 2001

    Google Scholar 

  4. ‘Port-based Network Access Cotrol’, IEEE Standard 802.1x, 2001.

    Google Scholar 

  5. L. Blunk, J. Vollbrecht, ‘PPP Extensible Authentication Protocol (EAP)’, IETF RFC2284, 1998.

    Google Scholar 

  6. B. Aboba, D. Simon, ‘PPP EAP TLS Authentication Protocol’, IETF RFC2716, 1999.

    Google Scholar 

  7. Nikita Borisov, Ian Goldberg, David Wagner, “Intercepting Mobile Communications: The Insecurity of 802.11”, Proceedings of the 7th International Conference on Mobile Computing and Networking, 2001.

    Google Scholar 

  8. Arunesh Mishra, William A. Arbaugh, ‘An Initial Security Analysis of the IEEE 802.1X Standard’, 2002.

    Google Scholar 

  9. David Wagner, Bruce Schneier, Analysis of the SSL 3.0 Protocol, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, Jh., Ryou, Jc. (2003). Strong User Authentication in IEEE802.11 Wireless LAN. In: Chung, CW., Kim, CK., Kim, W., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues — HSI 2003. HSI 2003. Lecture Notes in Computer Science, vol 2713. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45036-X_68

Download citation

  • DOI: https://doi.org/10.1007/3-540-45036-X_68

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40456-9

  • Online ISBN: 978-3-540-45036-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics