{"title":"Wireless network token-based fast authentication","authors":"G. Kbar","doi":"10.1109/ICTEL.2010.5478863","DOIUrl":null,"url":null,"abstract":"Wireless Networks based on WIFI or WIMAX become popular and are used in many places as compliment network to wired LAN to support mobility. There is performance issues associated with the usage of WLAN that put some restriction on adapting this technology everywhere. Securing the open access to avoid attacks at the physical and MAC layer with high speed performance during authentication is considered an important issue. IEEE 802.1x, suggested a solution to address the security issue at the MAC layer, and there are varieties of implementations address this solution but they require long period of time to complete the authentication. In this paper a new technique for securing the WLAN network using fast token-based authentication has been invented to address the vulnerability inherited by the wireless network at the MAC layer. This technique is based on an authentication server distributing a security token, public authentication key, and network access key parameter to eligible mobile client MCs during registration. All messages will be encrypted during registration using temporary derived token key, but it will use derived valid token key during authentication. The token, the authentication key and the access network parameter key will be only distributed during registration. This makes the security parameters known only to authentication server, authenticator and MC. Attackers would be unlikely able to know the token and other security keys because they are only exchanged during registration. Moreover, this technique will avoid the exchange of public keys during authentication such as the one used in other existing technologies, and consequently speedup the authentication phase which is very critical to wireless technologies.","PeriodicalId":208094,"journal":{"name":"2010 17th International Conference on Telecommunications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 17th International Conference on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTEL.2010.5478863","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Wireless Networks based on WIFI or WIMAX become popular and are used in many places as compliment network to wired LAN to support mobility. There is performance issues associated with the usage of WLAN that put some restriction on adapting this technology everywhere. Securing the open access to avoid attacks at the physical and MAC layer with high speed performance during authentication is considered an important issue. IEEE 802.1x, suggested a solution to address the security issue at the MAC layer, and there are varieties of implementations address this solution but they require long period of time to complete the authentication. In this paper a new technique for securing the WLAN network using fast token-based authentication has been invented to address the vulnerability inherited by the wireless network at the MAC layer. This technique is based on an authentication server distributing a security token, public authentication key, and network access key parameter to eligible mobile client MCs during registration. All messages will be encrypted during registration using temporary derived token key, but it will use derived valid token key during authentication. The token, the authentication key and the access network parameter key will be only distributed during registration. This makes the security parameters known only to authentication server, authenticator and MC. Attackers would be unlikely able to know the token and other security keys because they are only exchanged during registration. Moreover, this technique will avoid the exchange of public keys during authentication such as the one used in other existing technologies, and consequently speedup the authentication phase which is very critical to wireless technologies.