Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.4.497

Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange  

Lee, Jong-Hu ((주)시큐컴 대표이사)
Lee, Myung-Sun (한남대학교 대학원 컴퓨터공학)
Ryou, Jae-Cheol (충남대학교 정보통신공학부)
Abstract
The existing wireless LAN standard IEEE802.11b has many vulnerabilities from security point of view. The authentication mechanisms in IEEE802.11b have many vulnerabilities. As a result to complement the weak of IEEE802.11b authentication, the IEEE802.1x had been developed in the sense of providing strong user authentication with appropriate mechanism. But this mechanism does not perform AP authentication and there are also some weak points. And in confidentiality and message Integrity case, WEP is weak from key stream reuse attack, IV reuse attack and so on. For that reason, in this paper we propose secure wireless LAN system. Our system provides strong user authentication, confidentiality, and message integrity based on existing IEEE802.1x framework and TLS.
Keywords
WLAN; IEEE802.11b; IEEE802.1x; User Authentication; Ker Exchange;
Citations & Related Records
연도 인용수 순위
  • Reference
1 James T. Geier, Jim Geier, 'Wireless LANs (2nd Edition),' SAMS, 2001
2 Nikita Borisov, Ian Goldberg, David Wagner, 'Intercepting Mobile Communications : The Insecurity of 802.11,' Proceedings of the 7th International Conference on Mobile Computing and Networking, July, 2001   DOI
3 'Port-based Network Access Control,' IEEE Standard 802.1x, June, 2001
4 L. Blunk, J. Vollbrecht, 'PPP Extensible Authentication Protocol (EAP),' IETF RFC2284, Mar., 1998
5 B. Aboba, D. Simon, 'PPP EAP TLS Authentication Protocol,' IETF RFC2716, Oct., 1999
6 Arunesh Mishra, William A. Arbaugh, 'An Initial Security Analysis of The IEEE 802.1X Standard,' Feb., 2002
7 Tom Katygiannis, Les Owens, 'Draft Wireless Network Security,' National Institute of Standards and Technology (NIST), 2002
8 'IEEE802.11b Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specification,' IEEE Standard 802.11b, 1999
9 S. Fluhrer, I. Martin, A. Shamir, 'Weaknesses in the key scheduling algorithm of rc4,' Eighth Annual Workshop on Selected Areas in Cryptography, Aug., 2001
10 Core SDI, 'crc32 compensation attack against ssh-1.5 http://www.core-sdi-com/soft/ssh/attacke.txt', 1995
11 D. Wagner and B. Schneier, 'Analysis of the SSL 3.0 protocol,' Proceddings of the 2nd USENIX Workshop on Electronic Commerce(EC-96), Nov., 1996
12 Arunesh Mishra, Nick L. Petroni, Jr, Bryan D. Payne, 'Open Source Implementation of 802.1x,' http://www.open1x.org, 2003
13 The Free RADIUS Project, http://www.freeradius.org, 2002
14 John Viega, Matt Messier, Pravir Chandra, 'Network Security with OpenSSL,' O'reilly, 2002