Wireless LAN Security Solutions for Secure Wireless Communications

  • Kim, Su-Yong (Dept. of Inform. & Telecomm. Eng., Graduate School of Hankuk Aviation Univ.) ;
  • Ahn, Duck-Ki (Dept. of Inform. & Telecomm. Eng., Graduate School of Hankuk Aviation Univ) ;
  • Roh, Jae-Sung (Dept. of Inform. Comm. Eng., Seoil Colleg) ;
  • Oh, Chang-Reon (School of Information and Technology, Korea University of Technology and Educatio) ;
  • Cho, Sung-Joon (School of Electronics, Telecomm. and Computer Eng, Hankuk Aviation Univ.)
  • Published : 2003.12.01

Abstract

The $4^{th}$ generation mobile communications, through several radio access networks such as WLAN, Bluetooth, UMTS, GPRS, CDMA 1X, and IMT-2000 in the same area offering different type of coverage, will support interactive multimedia services in additions to wider bandwidths, higher bit rates, and service portability. Regardless of various radio access networks, they will also support robust security mechanisms, as well as seamless mobility and common authentication. In this paper, we give an overview of WLAN security and examine its security problems. We also explain the enhanced security schemes, such as port-based authentication, EAP, and IEEE 802.1X. For secure wireless communications, several possible security solutions are offered and evaluated in various respects to improve WLAN security. This paper will make a contribution to provide more secure wireless communications to cellular operators embracing WLAN technology as a means to generate new revenues based on data services.

Keywords

References

  1. R. Berezdivin, R. Breinig, and R. Topp, 'NextGeneration Wireless Communications Concepts and Technologies,' IEEE Communications Magazine, pp. 108-116, March, 2002
  2. T. Otsu, I. Okajima, N. Umeda, and Y. Yamao, 'Network Architecture for Mobile Communications Systems Beyond IMT-2000,' IEEE Personal Communications, pp. 31-37, October, 2001
  3. Hyo Soon Park, Sung Hoon Yoon, Tae Hyoun Kim, Jung Shin Park, Mi Sun Do, and Jai Yong Lee, 'Vertical Handoff Procedure and Algorithm between IEEE802.11 WLAN and CDMA Cellular Network,' CIC 2002, LNCS 2524, pp. 103-112, 2003
  4. IEEE Std 802.11, 'Standard for Local and Metropolitan Area Networks : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," August, 1999
  5. IEEE Std 802.11a, 'Standard for Local and Metropolitan Area Networks: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications : High-speed Physical Layer in the 5 GHZ Band,' September, 1999
  6. IEEE Std 802.11b, 'Standard for Local and Metropolitan Area Networks: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications:Higher-Speed Physical Layer Extension in the 2.4 GHz Band,' November, 2001
  7. IEEE P802.11g/D8.2, 'Draft for Local and Metropolitan Area Networks : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications : Further Higher Data Rate Extension in the 2.4 GHz Band,' April, 2003
  8. IEEE Std 802.11i/D4.1, 'Draft Supplement to IEEE Standard for Local and Metropolitan Area Networks: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements,' July, 2003
  9. IEEE Std 802.1X-2001, IEEE Standard for Local and Metropolitan Area Networks: Port-Based Access Control
  10. IETF RFC 2284, Extensible Authentication Protocol (EAP), March, 1998