Call for Paper - March 2022 Edition
IJCA solicits original research papers for the March 2022 Edition. Last date of manuscript submission is February 22, 2022. Read More

Mechanisms for Security and Authentication of Wi-Fi devices

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 33 - Number 5
Year of Publication: 2011
Authors:
Gajraj Singh
Dr. P.K. Yadav
10.5120/4013-5699

Gajraj Singh and Dr. P K Yadav. Article: Mechanisms for Security and Authentication of Wi-Fi devices. International Journal of Computer Applications 33(5):1-8, November 2011. Full text available. BibTeX

@article{key:article,
	author = {Gajraj Singh and Dr. P.K. Yadav},
	title = {Article: Mechanisms for Security and Authentication of Wi-Fi devices},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {33},
	number = {5},
	pages = {1-8},
	month = {November},
	note = {Full text available}
}

Abstract

This paper presents an overview of the different approaches for Wi-Fi device security with particular focus on public hotspots. This mainly involves solving the authentication problem. Common, as well as alternative solutions are presented and critically discussed with respect to the user’s security and the usability. Today, public hotspots are not as secure as they could be if they implemented current standards and protocols for secure wireless networking. The issues with these new standards in public network environments are discussed and possible solutions presented. In order to facilitate this discussion, several concepts, protocols and standards in the context of wireless LAN security are presented. The paper concludes with an evaluation of the different approaches for hotspot authentication.

Reference

  • Internet Draft published by the IETF., PEAPv0 draft- kamath-pppext-peapv0-00.txt and PEAPv1 draft-josefsson-pppext-eap-tls-eap-10.txt.
  • Internet Architecture Board (IAB).,
  • Online http://www.ietf.org/proceedings/06mar/IDs/draft-iab-auth-mech-05.txt.
  • RSA Security.,
  • Online http://www.rsa.com/node.aspx?id=1156.
  • Diffie, Whitfield and Hellman, Martin., New Directions in Cryptography, IEEE Transactions on Information Theory, Vol. IT-22,6, pp. 644-654. 1976.
  • Gerardo I. Simari - Universidad Nacional del Sur, Argentina., A Primer on Zero Knowledge Protocols. 2002.
  • Hannu A. Aronsson, Helsinki UT., Zero Knowledge Protocols and Small Systems.
  • Online http://www.tml.tkk.fi/Opinnot/Tik-110.501/1995/zeroknowledge.html.
  • S. M. Bellovin and M. Merritt., Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. Oakland : Proceedings of the I.E.E.E. Symposium on Research in Security and Privacy, 1992.
  • Madjid Nakhjiri and Mahsa Nakhjiri., AAA and Network Security for Mobile Access. s.l. : WILEY, 2005.
  • Ron Rivest, Adi Shamir and Len Adleman., A method for obtaining Digital Signatures and Public Key Cryptosystems. ACM : Communications of the ACM. pages 120-126, 1978.
  • VeriSign., White Paper - Total Cost of Ownership for PKI.
  • International Organisation for Standardization (ISO)., ISO/IEC 13335-1:2004 - Information technology - Security techniques.
  • —. ISO 17799-2005 - Information technology - Security techniques.