A Survey of WPA and 802.11i RSN Authentication Protocols

نویسندگان

  • Kwang-Hyun Baek
  • Sean W. Smith
  • David Kotz
چکیده

In the new standards for WLAN security, many choices exist for the authentication process. In this paper, we list eight desired properties of WLAN authentication protocols, survey eight recent authentication protocols, and analyze the protocols according to the desired properties.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Verification of IEEE 802.11 Authentication Protocols

IEEE 802.11 is the standard designed to provide secured communication in wireless LAN. The IEEE 802.11i specification contains both WPA-PSK, WPA-GPG authentication protocols. IEEE 802.11w authentication protocol enhances the IEEE802.11i security for selected management frames. These protocols allow a wireless station to gain access to a protected wireless network managed by an access point. In ...

متن کامل

Wireless Network Security

Wireless networking is becoming increasingly prevalent in modern networked environments. This paper examined methods used to secure wireless networks from intrusion and eavesdropping. WEP, WPA and RSN were examined to see the progression from weak to much stronger security for wireless LANs. WEP was incredibly insecure, but these vulnerabilities were addressed to produce significantly more secu...

متن کامل

Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks

The purpose of the IEEE 802.11i standard is to endue wireless networks with advanced security by leveraging mature and proven security technologies. The concept of a Robust Secure Network (RSN) as a long-term security architecture was defined in order to provide confidentiality of data being transferred over the wireless medium as well as to provide mutual authentication between mobile stations...

متن کامل

Multi-dimensional Analyses of 802.11 Wireless Network Security Protocols

Wireless networks have become so ubiquitous that researchers all over the world have come up with various security protocols to ensure confidentiality and integrity of data as well as availability of resources. IEEE 802.11 task group drafted a new wireless security protocol known as robust security network (RSN circa 2009) erstwhile Wi-Fi alliance came up with Wi-Fi Protected Access (WPA). The ...

متن کامل

Security Analysis and Improvements for IEEE 802.11i

This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model, 802.11i appears to provide effective data confidentiality and integrity when CCMP is used. Furthermore, 802.11i may provide satisfactory mutual authentication and key management, although there are some potential impl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004