Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.4.29

Lightweight Packet Authentication for Access Control in IEEE 802.11  

Lee, Keun-Soon (Dept. of Computer Science, Yonsei Univ.)
Kim, Hyo-Jin (Dept. of Computer Science, Yonsei Univ.)
Song, Joo-Seok (Dept. of Computer Science, Yonsei Univ.)
Abstract
Because IEEE 802.11 has several security vulnerabilities, IEEE 802.11i was proposed and accepted. But IEEE 802.11i has much overhead for most of users for the web surfing. Besides not only node the authentication but also the packet authentication is needed to communicate. Although IEEE 802.11i uses TKIP(Temporal Key integrity Protocol) and CCMP(CTR with CBC-MAC Protocol), they have a lot of overheads. In this paper, Lightweight Packet Authentication(LIPA) is proposed. LIPA has less overhead and short delay so that it can be affordable for simple web-surfing which does not need stronger security. After comparing performances of LIPA with those of TKIP and CCMP, LIPA is more efficient than other schemes for transmitting packets.
Keywords
access control; IEEE 802.11; LIPA; packet authentication; WLAN;
Citations & Related Records
연도 인용수 순위
  • Reference
1 한국 인터넷 정보 센터, '2003 하반기 정보화실태조사(요약보고서),' 정보통신부, site at: http://www.mic.go.kr/notice/index_view.jspidx=3400&page_no=1&mode=&selOption=&keyword=
2 H. Johnson, A. Nilsson, J. Fu, S.F. Wu, A. Chen, H. Huang, 'SOLA: A One-bit Identiry Authentication Protocol for Access Control in IEEE 802.11,' Proceeding of IEEE Global Telecommunications Conference 2002, 1, pp. 768-772, 2002
3 L. Blum, M. Blum, M. Shub, 'A Simple Unpredictable Pseudo-Random Number Generator,' SIAM Journal on Computing, 15(2), pp. 364-383, 1996   DOI   ScienceOn
4 A. Menezes, P. van Oorschot, S. Vanstone, 'Handbook of Applied Cryptography,' CRC Press Inc., pp. 175-184, 1997
5 Kui Ren, Hyunrok Lee, Kyusuk Han, Jaemin Park, Kwangjo Kim, 'An Enhanced Lightweight Authentication Protocol for Access Control in Wireless LANs,' IEEE International Conference On Networks(ICON'04), Hilton, Singapore, Nov. 16-19, 2004
6 F. Wu, H. Johnson, A. Nilsson, 'SOLA: lightweight security for access control in IEEE 802.11,' IT Professional, 6(3), pp. 10-16, May- June 2004
7 J. Black, S. Halevi, H. Krawcyk, T. Krovets, P. Rogaway, 'MAC: Fast and secure message authentication,' Proceedings of Lecture Notes in Computer Science, Springer-Verlag, CRYPTO '99, 1666, pp. 216-233, 1999
8 'IEEE Standard for Information technology-Telecommunications and information exchange between systems- Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements,' IEEE Std 802.11i-2004, pp. 1-175, 2004
9 H. Krawcyk, M. Bellare, R. Canetti, 'HMAC: Keyed-hashing for messageauthentication,' RFC 2104, Feb. 1997
10 W. Stallings, 'Cryptography and Network Security Principles and Practice,' Prentice Hall, 2, pp. 74-75, 1999
11 F. Zhao, Y. Shin, S.F. Wu, H. Johnson, A. Nilsson, 'RBWA: an efficient random-bit window-based authentication protocol,' Proceedings of Global Telecommunications Conference(GLOBECOM '03), 3, pp. 1379-1383, Dec. 1-5, 2003
12 'Information Technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements-part 11: Wireless Lan Medium Access Control (MAC) And Physical Layer (PHY) Specifications,' IEEE Std 802.11-1997, pp. i-445, Nov. 18, 1997
13 S. Kent, R. Atkinson, 'Security Architecture for the Internet Protocol,' RFC 2401, Nov. 1998
14 N. Cam-Winget, R. Housley, D. Wagner, J. Walker, 'Wireless networking security: Security flaws in 802.11 data link protocols,' Communications of the ACM, 46(5), pp. 35-39, May 2003
15 A. Wool, 'A Note on the Fragility of the 'Michael' Message Integrity Code,' IEEE Transactions on Wireless Communications, 3(5), pp. 1459-1462, Sep. 2004   DOI   ScienceOn
16 K.L Calvert., S. Venkatraman, J.N. Griffioen., 'FPAC: fast, fixed-cost authentication for access to reserved resources,' Proceedings of IEEE Twenty- First Annual Joint Conference of the IEEE Computer and Communications Societies.(INFOCOM), 2, pp. 1049-1058, Jun. 23-27, 2002