Analysis of a local-area wireless network
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
An end-to-end approach to host mobility
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Dynamic host configuration for managing mobility between public and private networks
USITS'01 Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems - Volume 3
Wide-area Internet traffic patterns and characteristics
IEEE Network: The Magazine of Global Internetworking
MobiCom poster: public-key-based secure Internet access
ACM SIGMOBILE Mobile Computing and Communications Review
Access control protocols with two-layer architecture for wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the impact of quality of protection in wireless local area networks with IP mobility
Mobile Networks and Applications
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
EURASIP Journal on Wireless Communications and Networking
Regional-based authentication against dos attacks in wireless networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Architecture of secure cross-platform and network communications
Proceedings of the 2nd international conference on Ubiquitous information management and communication
A proactive wireless self-protection system
Proceedings of the 5th international conference on Pervasive services
WSEAS TRANSACTIONS on COMMUNICATIONS
Link-layer protection in 802.11i WLANS with dummy authentication
Proceedings of the second ACM conference on Wireless network security
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
Computer Standards & Interfaces
NMACA: a novel methodology for message authentication code algorithms
TELE-INFO'09 Proceedings of the 8th Wseas international conference on Telecommunications and informatics
Fast track article: Bringing law and order to IEEE 802.11 networks-A case for DiscoSec
Pervasive and Mobile Computing
Design of WLAN secure system against weaknesses of the ieee 802.1x
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
WLAN security performance study
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
Hi-index | 0.00 |
As WEP has been shown to be vulnerable to multiple attacks, a huge effort has been placed on specifying an access control mechanism to be used in wireless installations. However, properties of the wireless environment have been exploited to perform multiple DoS attacks against current solutions, such as 802.11/802.1X. In this paper we discuss the main wireless idiosyncrasies and the need for taking them into account when designing an access control mechanism that can be used in both wireless and wired networks. We present the design of a mobility-aware access control mechanism suitable for both wireless and wired environments and show how the DoS attacks discussed can be prevented by implementing secure association and other essential services. The architecture proposed here, composed of the SIAP and SLAP protocols, uses public keys together with the RSA and AES encryption algorithms to provide a flexible service.