• 제목/요약/키워드: Wireless Authentication

검색결과 575건 처리시간 0.025초

망 인프라 공유를 위한 무선랜 시스템들간의 상호 인증 연동 방법 (An Authentication Interworking Mechanism between Multiple Wireless LANs for Sharing the Network Infrastructure)

  • 이완연
    • 정보처리학회논문지A
    • /
    • 제11A권6호
    • /
    • pp.451-458
    • /
    • 2004
  • 기존의 무선랜 시스템 관련 연구에서는 단일 시스템 환경에서 통신 중에 발생하는 보안 문제를 해결하거나 이동 중에 발생하는 재인증을 빠르게 지원하는 방법들을 주로 연구하였다. 본 논문에서는 다수의 무선랜 시스템들을 연동하여 통신 인프라를 상호간에 공유하여 사용하고자 할 때, 자신의 무선랜 시스템에 가입된 사용자들이 타 무선랜 시스템 영역에서도 인증을 성공적으로 수행할 수 있도록 지원하는 방법을 제시한다. 제시된 방법에서는 타 무선랜 시스템에 소속된 무선 접속장치 또는 인증 서버가 자신의 무선랜 시스템에 소속된 인증 서버와 연동하여 사용자의 인증 과정을 중재하도록 설계되었다. 제시된 인증 연동 방법은 802.1X와 EAP-MD5 규격을 기반으로 구현된 무선랜 시스템들을 대상으로 구현되었다.

무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선 (Authentication Scheme in Wireless Mobile Multi-hop Networks)

  • 이용;이구연
    • 산업기술연구
    • /
    • 제27권B호
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

A Secure WLAN Authentication Scheme

  • Singh, Rajeev;Sharma, Teek Parval
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권3호
    • /
    • pp.176-187
    • /
    • 2013
  • Message replay, malicious Access Point (AP) associations and Denial of Service (DoS) attacks are the major threats in Wireless LANs. These threats are possible due to a lack of proper authentication and insecure message communications between wireless devices. Current wireless authentication & key exchange (AKE) schemes and security protocols (WEP, WPA and IEEE 802.11i) are not sufficient against these threats. This paper presents a novel Secure WLAN Authentication Scheme (SWAS). The scheme introduces the delegation concept of mobile authentication in WLANs, and provides mutual authentication to all parties (Wireless Station, Access Point and Authentication Server). The messages involved in the process serve both authentication and key refreshing purposes. The scheme enhances the security by protecting the messages through cryptographic techniques and reduces the DoS impact. The results showed that cryptographic techniques do not result in extra latencies in authentication. The scheme also reduces the communication cost and network overhead.

  • PDF

Wireless PKI for Reducing Certificate Acquisition Time According to Authentication Path

  • Choi Seung-Kwon;Cho Yong-Hwan;Shin Seung-Soo;Jang Yoon-Sik
    • International Journal of Contents
    • /
    • 제1권1호
    • /
    • pp.29-34
    • /
    • 2005
  • In this paper, we proposed an advanced authentication structure for reducing the certificate acquisition time which is one of the factors that should be improved in a conventional wireless PKI. A conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. We simulated and compared the authentication structure proposed by Sufatrio, K. Lam[4] and proposed authentication structure in terms of the authentication time. Simulation results show that the proposed method reduces the authentication time compared to the conventional wireless PKI authentication method.

  • PDF

A New Roaming Authentication Framework For Wireless Communication

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin;Zhao, Qianqian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권8호
    • /
    • pp.2061-2080
    • /
    • 2013
  • Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users. However, the classical approach requires the home server's participation during the authentication between the mobile user and the foreign server. So the more the roaming requests are performed the heavier burden will be on the home server. In this paper, we propose a new roaming authentication framework for wireless communication without the home server's participation. The new roaming authentication protocol in the new framework takes advantage of the ID-based cryptography and provides user anonymity. It has good performance compared with the roaming authentication protocols whose authentication do not need the home server's participation in terms of security and computation costs. Moreover, a new User-to-User authentication protocol in the new framework is also present. All the authentications proposed in this paper can be regarded as a common construction and can be applied to various kinds of wireless networks such as Cellular Networks, Wireless Mesh Networks and Vehicle Networks.

무선 센서 네트워크 환경을 위한 보안성이 향상된 프라이버시 보호형 two-factor 인증 프로토콜 (Security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks)

  • 최윤성;장범환
    • 디지털산업정보학회논문지
    • /
    • 제15권4호
    • /
    • pp.71-84
    • /
    • 2019
  • Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol.

On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks

  • Wang, Qiuhua;Kang, Mingyang;Yuan, Lifeng;Wang, Yunlu;Miao, Gongxun;Choo, Kim-Kwang Raymond
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권6호
    • /
    • pp.2255-2281
    • /
    • 2021
  • Channel characteristic-based physical layer authentication is one potential identity authentication scheme in wireless communication, such as used in a fog computing environment. While existing channel characteristic-based physical layer authentication schemes may be efficient when deployed in the conventional wireless network environment, they may be less efficient and practical for the industrial wireless communication environment due to the varying requirements. We observe that this is a topic that is understudied, and therefore in this paper, we review the constructions and performance of several commonly used test statistics and analyze their performance in typical industrial wireless networks using simulation experiments. The findings from the simulations show a number of limitations in existing channel characteristic-based physical layer authentication schemes. Therefore, we believe that it is a good idea to combine machine learning and multiple test statistics for identity authentication in future industrial wireless network deployment. Four machine learning methods prove that the scheme significantly improves the authentication accuracy and solves the challenge of choosing a threshold.

Authentication & Accounting Mechanism on IEEE802.1x with Mobile Phone

  • Lee, Hyung-Woo;Cho, Kwang-Moon
    • International Journal of Contents
    • /
    • 제2권4호
    • /
    • pp.12-18
    • /
    • 2006
  • The number of wireless public network user is increasing rapidly. Security problem for user authentication has been increased on existing wireless network such as IEEE802.11 based Wireless LAN. As a solution, IEEE802.1x (EAP-MD5, EAP-TLS, EAP-TTLS), X.509, protocol or security system was suggested as a new disposal plan on this problem. In this study, we overview main problem on existing EAP-MD5 authentication mechanism on Wireless LAN and propose a SMS(Short Message Service) based secure authentication and accounting mechanism for providing security enhanced wireless network transactions.

  • PDF

타원곡선을 이용한 무선 PKI 인증구조 (Wireless PKI Authentication Structure using Elliptic Curve)

  • 신승수;한군희
    • 한국산학기술학회논문지
    • /
    • 제7권5호
    • /
    • pp.879-886
    • /
    • 2006
  • 본 논문에서는 기존의 무선 PKI에서 개선되어야 할 여러 가지 사항 중에서 인증서 획득시간을 단축하기 위한 새로운 인증구조를 제안하고자 한다. 개인키를 기반으로 하는 현재의 무선 PKI 인증은 확장이 힘들다는 단점이 있다. 또한 전자상거래에서 중요한 부인 봉쇄 서비스를 제공할 수 없다. 이러한 문제점을 해결하기 위하여 Sufatrio, K. Lam[4]는 공개키 기반의 인증방법을 제안하였다. 기존의 키 교환방식에서 키 교환 설정단계가 단순히 이산대수문제에 근거하여 수행되었지만, 본 논문에서는 인증서 획득시간 단축을 위해 상호인증과정과 키 교환 설정단계에서 타원곡선을 적용하였다. Sufatrio, K. Lam[4]의 인증구조와 타원곡선을 적용한 인증구조에서 인증서 획득시간을 실험을 통해 비교 분석한 결과 인증서 획득 시간이 효율적으로 단축되었다.

  • PDF

무선 LAN 연결 해제 공격과 보안 (Disconnection of Wireless LAN Attack and Countermeasure)

  • 홍성혁
    • 디지털융복합연구
    • /
    • 제11권12호
    • /
    • pp.453-458
    • /
    • 2013
  • 무선 LAN 환경에서는 최대한 안전한 것이 가장 중요하다. 표준 802.11 보안은 매우 네트워크 공격에 대해 매우 많은 취약점을 가지고 있다. IEEE 에서는 이러한 취약점에 대해서 보안을 하기 위해 많은 메커니즘을 만들지만, 무선 LAN의 특성인 공중에 브로드 캐스트 하는 방식 때문에 다른 환경의 네트워크 보다 많은 정보가 유출 될 수 있다. 무선 LAN 환경에서 해당 인증 이후에 무선 LAN에 접근 할 수 있기 때문에 이러한 인증 과정이 중요한 것이다. 하지만 인증 과정에는 안전적인 메커니즘이 사용하지만, 근본적인 최대한의 정보 노출을 줄이는 방법에 대해서는 언급하지 않고 있는 실태이다. 해당 연구에서는 무선 LAN의 인증과 인증 해제 방법과 이에 대한 취약점에 대해서 설명하고, 해당 취약점에 대한 보안 방법을 제시한다.