Browse > Article

A Lightweight Key Management for Wireless LANs with the Fast Re-authentication  

Lee Jae-Hyoung (금오공과대학교 컴퓨터공학부)
Kim Tae-Hyong (금오공과대학교 컴퓨터공학부)
Han Kyu-Phil (금오공과대학교 컴퓨터공학부)
Kim Young-Hak (금오공과대학교 컴퓨터공학부)
Abstract
Since the IEEE 802.11 wireless LANs were known to have several critical weaknesses in the aspect of security, a lot of works have been done to reduce such weaknesses of the wireless LAN security, Among them IEEE 802.lli may be the ultimate long-term solution that requires new security platform with new wireless LAM products. However, it might not be the best solution for small organizations due to its high cost where the cost is a critical issue. This paper proposes FR-WEP, a light-weight key management for wireless LANs that can be used with small changes of the existing Products. FR-WEP is an extension to a lightweight key management, WEP'(9), which was proposed lately. It makes up for the weak points of WEP' by providing lightweight mutual authentication with both host keys and user keys, and seamless key-refresh for authenticated users with fast re-authentication. It would be a good alternative to the heavy standards for wireless LAN security, especially to small organizations hoping for better security.
Keywords
wireless LANs; key management; fast re-authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W.A. Arbaugh, 'Your 802.11 Wireless Network has No Clothes,' In Proc. of IEEE International Conference on Wireless LAN's and Home Networks, 2001
2 ANSI/IEEE standard 802.11, 'Wireless LAN medium access control(MAC) and physical layer(PHY) specification,' 1999
3 R. L. Rivest, 'The RC4 encryption algorithm,' RSA Data Security Inc., (proprietary), 1992
4 Joseph et al., Development of a Transmission Error Model and an Error Control Model,' Technical Report, Georgia Institute of Technology, 1975
5 OPNET Technologies Inc., OPNET Modeler V.10.0, 2004
6 B. Ababa, 'Fast Handoff Issues,' doc.:IEEE802.11-03 /155r0, 2002
7 A. Wool, 'Lightweight Key Management for IEEE 802.11 Wireless LANs With Key Refresh and Host Revocation,' IEEE 802.11-02/411r0, 2002
8 N. Shankar et al., 'A Transparent Key Management Scheme for Wireless LANs Using DHCP,' HP Labs Technical Report HPL-200l-227, 2001
9 IEEE Society, IEEE Standard 802.11i/D3.0, 'Specification for Enhanced Security,' 2002
10 N. Ferguson, 'Michael: an improved MIC for 802.11 WEP,' Document number IEEE 802.11-02/020r0, 2002
11 IETF, 'US Secure Hash Algorithm 1 (SHA-1),' RFC 3174, 2001
12 Intersil Cooperation, ISL36356A AP Development Kit, 2003
13 N. Borisov et al., 'Intercepting mobile communications: The insecurity of 802.11,' In Proc. 7th ACM Conference on Mobile Computing and Networking (MOBICOM'01), Rome, Italy, 2001   DOI
14 C. Rigney, 'Remote Authentication Dial In User Service(RADIUS),' IETF RFC 2865, 2000
15 J. Daemen and V. Rijmen, 'Advanced Encryption Standard,' National Institute of Standards and Technology, NIST FIPS PUB 197, U.S. Department of Commerce, 2001
16 The Wi-Fi alliance, 'Wi-Fi Protected Access,' 2002
17 S. Fluhrer et al., 'Weaknesses in the key scheduling algorithm of RC4,' LNCS 2259. Springer-Verlag, 2001