Authentication and Security in IP based Multi–Hop Networks
نویسندگان
چکیده
Network security and authentication are very important for all kinds of communication networks to assure network stability and to avoid subscription fraud. In the last years – even for wireless local area networks – mechanisms have been found to support both in a cellular network. In multi–hop networks based on IEEE802.11, security and authentication are still open issues. Mainly the low price of the network infrastructure makes this kind of networks vulnerable. Within the scope of this paper we describe the application of IEEE802.1x in combination with UMTS Authentication and Key Agreement (AKA) to enable authentication and security in multi–hop networks. keywords: IP security, 802.1x, multi–hop, ad hoc, TLS, WEP, EAP, PEAP, EAPoL, UMTS AKA
منابع مشابه
MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملEnhancing the Security and Reliability for Data Transmission in Wireless Networks
Microwave Access (WiMAX) and Long-Term Evolution (LTE) are considered the best technologies for vehicular networks. WiMAX and LTE are Fourth-Generation (4G) wireless technologies that have well-defined quality of service (QoS) and security architectures.Existing work QoS-aware distributed security architecture using the elliptic curve Diffie– Hellman (ECDH) protocol that has proven security str...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملDesign and Analysis of Authentication Mechanisms in Single - and Multi - Hop Wireless Networks
LIANG, WEI. Design and Analysis of Authentication Mechanisms in Singleand Multi-Hop Wireless Networks. (Under the direction of Professor Wenye Wang). The increasing demand for ubiquitous Internet services imposes more security threats to communications due to open mediums in wireless networks. Thus, security mechanisms are proposed to protect communications, while putting more overheads on the ...
متن کاملSelf authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002