期刊文献+

Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs

Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs
下载PDF
导出
摘要 Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames.It utilizes the sequence number of the frame along with the authentication stream generators for authentication.Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation. Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames.It utilizes the sequence number of the frame along with the authentication stream generators for authentication.Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.
出处 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第2期144-152,共9页 电子科技学刊(英文版)
关键词 Authentication authentication frames receiver verified lightweight operations cryptographic encryption sender Authentication authentication frames receiver verified lightweight operations cryptographic encryption sender
  • 相关文献

参考文献17

  • 1H. Johnson, A. Nilsson, J. Fu, S.-F. Wu, A. Chen, and H. Huang, “SOLA: A one bit identity authentication protocol for access control in IEEE 802.11,” in Proc. of IEEE Global Telecommns Conf, 2002, pp. 768-772.
  • 2H. Wang, A. Velayutham, and Y. Guan, “A lightweight authentication protocol for access control in IEEE 802.11in Proc. of IEEE Global Telecommns Conf, 2003, pp. 1384-1388.
  • 3H. Wang, J. Cardo, and Y. Guan, “Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs,” Computer Communications, vol. 28, no. 14, pp. 1618-1630, 2005.
  • 4K. Ren, H. Lee, J. Park, and K. Kim, “An enhanced lightweight authentication protocol for access control in wireless LANs,” in Proc. of the 4th Int. Conf. on Networks, Daejeon, 2004, pp. 444-450.
  • 5Y-S. Lee, H-T. Chien, and W-N. Tsai, “Using random bit authentication to defend IEEE 802.11 DoS attacks,” Journal of Information Science and Engineering, vol. 25, no. 5, pp. 1485-1500, 2009.
  • 6D. L. Pepyne, Y. C. Ho, and Q. Zheng, “SPRiNG: synchronized random numbers for wireless security,” in Proc. of IEEE Wireless Communications and Networking,2003, pp. 2027-2032.
  • 7I. Lee and R. Hunt, “A novel design and implementation of Dos resistant authentication and seamless handoff scheme for enterprise WLANs,” in Proc. of Australian Information Secuity Management, Perth, 2010, pp. 49-61.
  • 8IEEE 802. lli, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements, IEEE Standard,2004.
  • 9C. He and J. C. Mitchell, “Security analysis and improvements for IEEE 802.lli,” in Proc. of the Annual Network and Distributed System Security Symposium, 2005, pp. 90-110.
  • 10C. S. Park, “Two-way handshake protocol for improved security in IEEE 802.11 wireless LANs,” Elsevier Journal Computer Communications, vol. 33, no. 9, pp. 1133-1140, 2010.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部