CFP last date
22 April 2024
Reseach Article

Mechanisms for Security and Authentication of Wi-Fi devices

by Gajraj Singh, Dr. P.K. Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 33 - Number 5
Year of Publication: 2011
Authors: Gajraj Singh, Dr. P.K. Yadav
10.5120/4013-5699

Gajraj Singh, Dr. P.K. Yadav . Mechanisms for Security and Authentication of Wi-Fi devices. International Journal of Computer Applications. 33, 5 ( November 2011), 1-8. DOI=10.5120/4013-5699

@article{ 10.5120/4013-5699,
author = { Gajraj Singh, Dr. P.K. Yadav },
title = { Mechanisms for Security and Authentication of Wi-Fi devices },
journal = { International Journal of Computer Applications },
issue_date = { November 2011 },
volume = { 33 },
number = { 5 },
month = { November },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume33/number5/4013-5699/ },
doi = { 10.5120/4013-5699 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:19:15.896951+05:30
%A Gajraj Singh
%A Dr. P.K. Yadav
%T Mechanisms for Security and Authentication of Wi-Fi devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 33
%N 5
%P 1-8
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents an overview of the different approaches for Wi-Fi device security with particular focus on public hotspots. This mainly involves solving the authentication problem. Common, as well as alternative solutions are presented and critically discussed with respect to the user’s security and the usability. Today, public hotspots are not as secure as they could be if they implemented current standards and protocols for secure wireless networking. The issues with these new standards in public network environments are discussed and possible solutions presented. In order to facilitate this discussion, several concepts, protocols and standards in the context of wireless LAN security are presented. The paper concludes with an evaluation of the different approaches for hotspot authentication.

References
  1. Internet Draft published by the IETF., PEAPv0 draft- kamath-pppext-peapv0-00.txt and PEAPv1 draft-josefsson-pppext-eap-tls-eap-10.txt.
  2. Internet Architecture Board (IAB).,
  3. Online http://www.ietf.org/proceedings/06mar/IDs/draft-iab-auth-mech-05.txt.
  4. RSA Security.,
  5. Online http://www.rsa.com/node.aspx?id=1156.
  6. Diffie, Whitfield and Hellman, Martin., New Directions in Cryptography, IEEE Transactions on Information Theory, Vol. IT-22,6, pp. 644-654. 1976.
  7. Gerardo I. Simari - Universidad Nacional del Sur, Argentina., A Primer on Zero Knowledge Protocols. 2002.
  8. Hannu A. Aronsson, Helsinki UT., Zero Knowledge Protocols and Small Systems.
  9. Online http://www.tml.tkk.fi/Opinnot/Tik-110.501/1995/zeroknowledge.html.
  10. S. M. Bellovin and M. Merritt., Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. Oakland : Proceedings of the I.E.E.E. Symposium on Research in Security and Privacy, 1992.
  11. Madjid Nakhjiri and Mahsa Nakhjiri., AAA and Network Security for Mobile Access. s.l. : WILEY, 2005.
  12. Ron Rivest, Adi Shamir and Len Adleman., A method for obtaining Digital Signatures and Public Key Cryptosystems. ACM : Communications of the ACM. pages 120-126, 1978.
  13. VeriSign., White Paper - Total Cost of Ownership for PKI.
  14. International Organisation for Standardization (ISO)., ISO/IEC 13335-1:2004 - Information technology - Security techniques.
  15. —. ISO 17799-2005 - Information technology - Security techniques.
Index Terms

Computer Science
Information Sciences

Keywords

Public WLAN Hotspot Authentication Wireless Security 802.1X EAP AAA