Cryptographic security Techniques for wireless networks
ACM SIGOPS Operating Systems Review
DoS and authentication in wireless public access networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
SIGUCCS '02 Proceedings of the 30th annual ACM SIGUCCS conference on User services
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
Analysis of the 802.11i 4-way handshake
Proceedings of the 3rd ACM workshop on Wireless security
Wireless LAN security and IEEE 802.11i
IEEE Wireless Communications
Hi-index | 0.01 |
The IEEE 802.1x framework, what was known to have adjusted the IEEE 802.11b's weakness in client authentication is a port-based control mechanism that introduces the logical port idea and performs authentication through the AP or the bridge system. Unfortunately, there are two problems in existing access authentication scheme for wireless LAN, the IEEE 802.1x. One of the problems is that it is possible for a malicious user to disguise as a right authenticator because he/she does not take into account the authentication of authenticators. The other problem is that a malicious user can force an authentication Server to waste computational resource by continuously accessing requests. In this paper, we propose a Wireless LAN secure system that offers secure encrypted communication and user authentications. The purpose of the WLAN secure system that this study suggests is to improve the weakness in security of IEEE 802.1x and to guarantee a secure encrypted communication.