Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.9.1983

Wireless LAN System based on IEEE 802.1x EAP-TLS Authentication Mechanism  

Hong, Seong-Pyo (조선대학교 산학협력단)
Han, Seung-Jo (조선대학교 정보통신공학과)
Abstract
The IEEE 802.1x standard provides an architectural framework which can be used various authentication methods. But, IEEE 802.1x also has vulnerabilities about the DoS(Denial of Service), the session hijacking and the MiM(Man in the Middle) attack due to caused by structural of authentication protocol. In this paper, we propose a WLAN system which can offer safety communication by complement of IEEE 802.1x vulnerabilities. The WLAN system accomplishes mutual authentications between authentication servers, clients and the AP using PKI and prevents an illegal user from intervening in communication to disguise oneself as a client, the AP or authentication servers. Also, we guarantee the safety of the communication by the Dynamic WEP key distribution between clients and the AP.
Keywords
Wireless LAN Security; Authentication; IEEE 802.1x; EAP-TLS;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Joshua Hill, "An Analysis of the RADIUS Authentication Protocol", Joshua Hill, pp. 1-12, 2001.
2 Joseph Davies, RADIUS Protocol Security and Best Practices, Microsoft Corporation, 2002.
3 WIRE1x, "Open Source Implementation of IEEE 802.1X", http://wire.cs.nthu.edu.tw/wire1x
4 OpenSSL Project, Open Source implementing the Secure Sockets Layer(SSL v2/v3) and Transport Layer Security(TLS v1), ttp:/www.openssl.org/
5 FreeRADIUS Project, Open Source Implementation of RADIUS, http://www.freeradius.org/
6 양형규, "무선 PKI 환경에서 보안 모듈에 관한 고찰", 강남대학교 산학기술연구소 논문집, 제 14호, pp. 123-140, 2002.
7 William A. Arbaugh, N. Shankar, Y.C. Justin Wan, "Your 802.11 Wireless Network has No Clothes", Proceedings of the First IEEE International Conference on Wireless LANs and Home Networks, pp. 1-13, 2001.
8 J.-C. Chen, M.-C. Jiang, Y.-W. Liu, "Wireless LAN Security and IEEE 802.11i", IEEE Wireless Communications, pp. 1-19, 2004.
9 송창렬, 정병호, 조기환, "무선랜 보안구조," 한국정보과학회지, 제 20권 4호, pp. 5-13, 2002
10 강유성, 오경희, 정병호, "무선랜 보안기술의 진화 동향 및 전망", 전자통신동향분석, 제 18권 제4호, pp. 36-46, 2003.
11 Arunesh Mishra, William A. Arbaugh, "An Initial Security Analysis of the IEEE 802.1X Standard", University of Maryland, pp. 1-12, 2002.
12 J.R. Walker, "Unsafe at Any Key Size; An Analysis of the WEP Encapsulation", IEEE 802.11 Committee, pp. 1-9, 2000.
13 IEEE, Draft P802.1X/D11: Standard for Port based Network Access Control, IETF Network Working Group, 2001.
14 P. Funk, S. Blake-Wilson, EAP Tunneled TLS Authentication Protocol (EAP-TTLS), IETF PPPEXT Working Group, 2005.
15 L. Blunk, J. Vollbrecht, PPP Extensible Authentication Protocol(EAP), IETF Network Working Group, 1998.