Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

SAKGP: Secure Authentication Key Generation Protocol in WLAN

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 7
Year of Publication: 2014
Latha P. H
Vasantha R

Latha P H and Vasantha R. Article: SAKGP: Secure Authentication Key Generation Protocol in WLAN. International Journal of Computer Applications 96(7):25-33, June 2014. Full text available. BibTeX

	author = {Latha P. H and Vasantha R},
	title = {Article: SAKGP: Secure Authentication Key Generation Protocol in WLAN},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {7},
	pages = {25-33},
	month = {June},
	note = {Full text available}


Wireless LAN is one of the cost effective way to establish local networking as compared to wired network. Although the last decade has seen various sophisticated WLAN routers and devices, but few of them are actually found to be highly resilient against potential attacks on WLAN. Literatures also share evidence that such issues are yet unsolved and call for a serious modeling of issues and testing the security efficiencies. The prime reason behind this is the incapability of the existing security protocols to ensure reliable authentication system. Hence, this study presents a technique that uses the most recent versions of cryptographic hash functions to ensure the bidirectional authentication between the nodes and WLAN router. Finally, the paper discusses about mathematical modeling of the presented security protocol as well as accomplished results are compared with the existing system.


  • http://www. gsmarena. com/glossary. php3?term=wi-fi
  • A. E. Earle, "Wireless Security Handbook," Auerbach Publications, pp. 348, 2005
  • "National Institute of Standards and Technology NIST 800-97", retrieved from Establishing Wireless Robust Security Networks: A Guide to IEEE 802. 11i, http://csrc. nist. gov/publications/nistpubs/800-97/SP800-97. pdf
  • B. Mitchell, "WPA - Wi-Fi Protected Access An Article from Computing", Wireless/networking. Retreived from http://compnetworking. about. com/cs/wirelesssecurity/g/bldef_wpa. htm, 2004
  • Latha. P H, Vasantha R, Review of Existing Security Protocols Techniques and their Performance Analysis in WLAN, International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), Vol. 7, pp. 162-171, December 2013
  • I. P. Mavridis, A-I. E. Androulakis, A. B. Halkias, P. Mylonas, "Real-Life Paradigms of Wireless Network Security Attacks," Informatics (PCI), 2011 15th Panhellenic Conference, pp. 112-116, 2011
  • F. Haddadi, M. A. Sarram, "Wireless Intrusion Detection System Using a Lightweight Agent," Computer and Network Technology (ICCNT), 2010 Second International Conference, pp. 84-87, 2010
  • O. N. Odhiambo, E. Biermann, G. Noel, "An integrated security model for WLAN," AFRICON, 2009. AFRICON '09. Pp. 1-6, 2009
  • A. Bittau, M. Handley, J. Lackey, "The final nail in WEP's coffin," Security and Privacy, 2006 IEEE Symposium, pp. 15-400, 2006
  • Y. Liu, Z. Jin, Y. Wang, "Survey on Security Scheme and Attacking Methods of WPA/WPA2," Wireless Communications Networking and Mobile Computing (WiCOM), 6th International Conference, pp. 1-4, 2010
  • A. T. Sherman, B. O. Roberts, W. E. Byrd, M. R. Baker, J. Simmons"Developing and delivering hands-on information assurance exercises: experiences with the cyber defense lab at UMBC," Information Assurance Workshop, Proceedings from the Fifth Annual IEEE SMC , pp. 242-249, 2004
  • M. Jagetia, T. Kocak, "A novel scrambling algorithm for a robust WEP implementation [wired equivalent privacy protocol," Vehicular Technology Conference, IEEE 59th , vol. 5, pp. 2487-2491, 2004
  • T. Tsukaune, Y. Todo, M. Morii, "Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation," Information Security (Asia JCIS), Seventh Asia Joint Conference, pp. 25-30, 2012
  • N. Phil, A. P. Horrocks. "Vulnerability of IEEE802. 11 WLANs to MAC layer DoS attacks. " pp. 14-14, 2004
  • Y. Omar, M. Youssef, E. H. Gamal,"ARQ secrecy: From theory to practice," Information Theory Workshop, ITW. IEEE, pp. 6-10, 2009
  • S. A. Pattar, Detection Of Rogue Access Points Present In The Wlan At The Server Side, Proceedings of IRF International Conference, 2014
  • S. Q. Wang, J. Y. Wang, Y. Z. Li, "The Web Security Password Authentication based the Single-Block Hash Function", Elsevier, 2013
  • Z-Y Wu, Y. Chung, F. Lai, T-S Chen, and H-C Lee, "An Enhanced Password-Based User Authentication Scheme For Grid Computing, An Enhanced Password-Based User Authentication Scheme For Grid Computing", Volume 7, Number 7(A), pp. 3751-3760, 2011
  • C. K. Kumar, C. Suyambulingom, "Multicollisions and iterated Cryptography hash functions", Journal of Computing Technologies Vol 2, Issue 3 ISSN 2278 – 3814, 2013
  • H. Delfs, H. Knebl, "Introduction to Cryptography: Principles and Applications", Springer, Computers, 367 pages, 2007
  • H. F. Tipton, M. Krause, "Information Security Management Handbook", Fifth Edition, CRC Press, Computers, 2036 pages, 2004.
  • http://www. emc. com/emc-plus/rsa-labs/historical/hash-function-update-potential-weakness-in-sha1. htm
  • http://www. entrust. net/knowledge-base/technote. cfm?tn=8526
  • http://keccak. noekeon. org/
  • http://www. cs. umd. edu/class/sum2003/cmsc311/Notes/Data/endian. html
  • http://en. wikipedia. org/wiki/Circular_shift
  • X. Zheng, C. Chen, C-T Huang, A Dual Authentication Protocol for IEEE 802. 11 Wireless LANs, pp. 565-569, IEEE, 2005
  • B. A. Kumar, K. Kavuri, "Novel approach for preventing hackers in data communication", International Journal of Computer Science and Advanced Computing, Vol. 1, Iss. 1, April. 2013
  • J. Friesen, "Learn Java for Android Development", A press, Computers, 806 pages, 2013
  • N. Nagaratnam, L. Koved, A. Nadalin, "Enterprise Java Security: Building Secure J2EE Applications", Addison-Wesley Professional, Computers, 581 pages, 2004