Skip to main content

A New Synchronization Protocol for Authentication in Wireless LAN Environment

  • Conference paper
Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3045))

Included in the following conference series:

  • 1128 Accesses

Abstract

Today, wireless LANs are widely deployed in various places such as corporate office conference rooms, industrial warehouses, Internet-ready classrooms, etc. However, new concerns have been raised regarding security. Currently, both virtual private network (VPN) and WEP are used together as a strong authentication mechanism. In this paper a new synchronization protocol for authentication is proposed which allows simple authentication, minimal power consumption at the mobile station, and high utilization of authentication stream. This is achieved by using one bit per a frame authentication, while main authentication process including synchronization is handled by access points. Computer simulation reveals that the proposed scheme significantly improves the authentication efficiency in terms of the number of authenticated frames and authentication speed compared with earlier protocol employing a similar authentication approach.

This work was supported in part by 21C Frontier Ubiquitous Computing and Networking, Korea Research Foundation Grant(KRF – 2003 – 041 – D20421) and the Brain Korea 21 Project in 2003. Corresponding author: Hee Yong Youn.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wang, H.-l., Velayutham, A., Guan, Y.: A Lightweight Authentication Protocol for Access Control in IEEE 802.11. Submitted to IEEE GlobeCom (March 2003)

    Google Scholar 

  2. Johnson, H., Nilsson, A., Fu, J., Felix Wu, S., Chen, A., Huang, H.: SOLA: A One-bit Identity Authentication Protocol for Access Control in IEEE802.11. In: Proceedings of IEEE GLOBECOM (September 2002)

    Google Scholar 

  3. Walker, J.: Unsafe at any key size: an analysis of the WEP encapsulation, Tech. Rep. 03628E, IEEE 802.11 committee (March 2000)

    Google Scholar 

  4. NORTEL networks com White paper: Secure Architectures for Wireless LANs in the Enterprise, available from http://www.nortelnetworks.com

  5. LAN MAN Standards of the IEEE Computer Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specification IEEE Standard 802.11, 1997 Edition (1997)

    Google Scholar 

  6. Institute of Electrical and Electronics Engineers (IEEE). Standard for port based Network Access Control. IEEE Draft p802.1X/D11 (March 2001)

    Google Scholar 

  7. Intel com Intel Building Blocks for Wireless LAN Security (February 2003), http://www.intel.com/network/connectivity/resources/doc_library/white_papers/WLAN_SecurityWP.pdf#1-3

  8. Borisov, N., Goldberg, I., Wangner, D.: Interception Mobile Communications: The Insecurity of 802.11

    Google Scholar 

  9. Yang, Y., Fu, Z., Wu, S.F.: Bands: an inter-domain internet security policy management system for IPSEC/VPN. In: IFIP/IEEE Eighth International Symposium on Integrated Network Management (2003)

    Google Scholar 

  10. Bhagavathula, R., Thanthry, N., Pendse, R.: Mobile IP and virtual private networks. In: Proceedings of 56th Vehicular Technology Conference, VTC 2002, September 2002, IEEE, Los Alamitos (2002)

    Google Scholar 

  11. CREWAVE CO., Ltd, available from http://www.crewave.com/Korean/menu/support/tech/tech_1.htm

  12. Zeng, J., Ansari, N.: Toward IP virtual private network quality of service: a service provider perspective. Communications Magazine 41(4), IEEE (April 2003)

    Google Scholar 

  13. Intel, VPN and WEP Wireless 802.11b security in a corporate environment, Intel white paper (March 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jo, H.S., Youn, H.Y. (2004). A New Synchronization Protocol for Authentication in Wireless LAN Environment. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3045. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24767-8_106

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24767-8_106

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22057-2

  • Online ISBN: 978-3-540-24767-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics