Alternative pair-wise key exchange protocols for robust security networks (IEEE 802.11i) in wireless LANs

被引:0
|
作者
Altunbasak, H [1 ]
Owen, H [1 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
关键词
D O I
10.1109/SECON.2004.1287901
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security flaws of the current the IEEE 802.11 standard are well known and have widely been publicized To provide improvements in security and enhance the current 802.11 MAC, the IEEE 802.11i task group has proposed a new security architecture called Robust Security Network (RSN). The proposed improvements in the new, architecture focus on two areas; the IEEE 802.1X standard for access control and encryption using Advanced Encryption Standard (AES). RSN uses a pairwise key exchange protocol utilizing 802.1X for mutual authentication. In this paper, we present two alternative pair-wise key exchange protocols to provide mutual authentication in Robust Security Networks. We utilize the same message structures used in RSN and reduce the number of handshake messages. These alternative protocols improve the timing requirements for mobility in WLANs, reduce channel contention, and decrease computational load on all users in WLANs. We also discuss the advantages and disadvantages of our proposed protocols in terms of complexity and vulnerabilities.
引用
收藏
页码:77 / 83
页数:7
相关论文
共 17 条
  • [1] Wireless LAN security and IEEE 802.11i
    Chen, JC
    Jiang, MC
    Liu, YW
    IEEE WIRELESS COMMUNICATIONS, 2005, 12 (01) : 27 - 36
  • [2] Robust re-authentication and key exchange protocol for IEEE 802.11 Wireless LANs
    Ganz, A
    Park, SH
    Ganz, Z
    IEEE MILITARY COMMUNICATIONS CONFERENCE - PROCEEDINGS, VOLS 1-3, 1998, : 1018 - 1022
  • [3] Pair-wise path key establishment in wireless sensor networks
    Sheu, Jang-Ping
    Cheng, Jui-Che
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2365 - 2374
  • [4] Performance Analysis of Pair-wise Key Establishment Protocols for Sensor Networks
    Zhang, Yuanyuan
    Gu, Dawu
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2637 - 2641
  • [5] Protecting enterprise wireless LANs using an integrated security approach of VPN over 802.11i
    Liu, Chibiao
    Yu, James T.
    3RD INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS, AND APPLICAT/4TH INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2006, : 278 - 283
  • [6] A Robust Pair-wise and Group Key Management Protocol for Wireless Sensor Network
    Rahman, Musfiq
    Sampalli, Srinivas
    Hussain, Sajid
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 1528 - 1532
  • [7] Pair-wise key pre-distribution scheme for wireless sensor networks
    Hu Ronglei
    Duan Xiaoyi
    Jiang Hua
    Zeng Ping
    Jiang Yitong
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [8] A method of pair-wise key distribution and management in distributed wireless sensor networks
    Liao, Xing
    Xu, Shizhong
    Wang, Sheng
    Zhou, Kaiyu
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2007, 4864 : 834 - +
  • [9] A Survey on Wireless Security protocols (WEP, WPA and WPA2/802.11i)
    Lashkari, Arash Habibi
    Danesh, Mir Mohammad Seyed
    Samadi, Behrang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 48 - +
  • [10] Pair-wise Key Update in Wireless Sensor Networks Based on Reputation Model
    Liu, Tao
    Chen, De-Jun
    Zhou, Ming-Zheng
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1558 - 1561