Abstract
The IEEE 802.1x framework, what was known to have adjusted the IEEE 802.11b’s weakness in client authentication is a port-based control mechanism that introduces the logical port idea and performs authentication through the AP or the bridge system. Unfortunately, there are two problems in existing access authentication scheme for wireless LAN, the IEEE 802.1x. One of the problems is that it is possible for a malicious user to disguise as a right authenticator because he/she does not take into account the authentication of authenticators. The other problem is that a malicious user can force an authentication Server to waste computational resource by continuously accessing requests. In this paper, we propose a Wireless LAN secure system that offers secure encrypted communication and user authentications. The purpose of the WLAN secure system that this study suggests is to improve the weakness in security of IEEE 802.1x and to guarantee a secure encrypted communication.
Chapter PDF
References
Patiyoot, D., Shepherd, S.J.: Cryptographic security Techniques for wireless networks. In: ACM SIGOPS Operating Systems Review, vol. 33, pp. 36–50. ACM Press, New York (1999)
Faria, D.B., Cheriton, D.R.: DoS and authentication in wireless public access networks. In: WiSe 2002 Conference, pp. 47–56. ACM Press, New York (2002)
Funk, P., Blake–Wilson, S.: EAP Tunneled TLS Authentication Protocol (EAP–TTLS). IETF PPPEXT Working Group (2005)
Cam–Winget, N., Housley, R., Wagner, D., Walker, J.: Wireless networking security: Security flaws in 802.11 data link protocols. In: Communications of the ACM, pp. 35–39. ACM Press, New York (2003)
Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the IEEE 802.1X Standard, University of Maryland, pp. 1–12 (2002)
Wi–Fi Alliance: Wi–Fi Protected Access, Wi–Fi Alliance White Paper (2003)
Arbaugh, W.A. (ed.): 802.11 Security Vulnerabilities, University of Maryland (2003)
Stubblefield, A., Ioannidis, J., Rubin, A.D.: A key recovery attack on the 802.11b wired equivalent privacy protocol(WEP). In: ACM Transactions on Information and System Security (TISSEC), vol. 7, pp. 319–332 (2004)
Chen, J.-C., Jiang, M.-C., Liu, Y.-W.: Wireless LAN Security and IEEE 802.11i. IEEE Wireless Communications, 1–19 (2004)
Vollbrecht, J., Moskowitz, R.: Wireless LAN Access Control and Authentication, InterLink Networks White Paper (2002)
He, C., Mitchell, J.C.: Security analysis: Analysis of the 802.11i 4–way handshake. In: WiSe 2004 Conference, pp. 43–50. ACM Press, New York (2004)
Allen, J., Wilson, J.: Securing a wireless network. In: Proceedings of the 30th annual ACM SIGUCCS conference on User services, pp. 213–215. ACM Press, New York (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hong, Sp., Park, Ja., Han, Sj., Pyun, Jy., Lee, J. (2007). Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. In: Szczuka, M.S., et al. Advances in Hybrid Information Technology. ICHIT 2006. Lecture Notes in Computer Science(), vol 4413. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77368-9_60
Download citation
DOI: https://doi.org/10.1007/978-3-540-77368-9_60
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77367-2
Online ISBN: 978-3-540-77368-9
eBook Packages: Computer ScienceComputer Science (R0)