Abstract
Authentication is a challenging area in wireless networks. The authentication process of IEEE 802.11i is using the standards of IEEE 802.1X for authentication; and for key management and distribution 4-way handshake protocol is used. In this paper, we exhaustively review the authentication technique in IEEE 802.11i. The work presents a security analysis of authentication technique which shows its strengths against various threats and some flaws which are responsible for security breaches. The paper compares and contrasts the techniques and points out current issues and challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hiertz, G., Denteneer, D., Stibor, L., Zang, Y., Costa, X.P., Walke, B.: The IEEE 802.11 universe. IEEE Communications Magazine 48, 62–70 (2010)
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)
Arbaugh, W.A., Shankar, N., Wan, Y.C.J., Zhang, K.: Your 802.11 wireless network has no clothes. IEEE Wireless Communications 9, 44–51 (2002)
Cam-Winget, N., Housley, R., Wagner, D., Walker, J.: Security flaws in 802.11 data link protocols. Communications of the ACM 46, 35–39 (2003)
Walker, J.: Unsafe at any key size: An analysis of the WEP encapsulation. IEEE document 802, 362 (2000)
Manley, M.E., McEntee, C.A., Molet, A.M., Park, J.S.: Wireless security policy development for sensitive organizations. IEEE Information assurance and security 25, 150–157 (2005)
Bittau, A., Handley, M., Lackey, J.: The final nail in WEP’s coffin. Proceedings of the 2006 IEEE Symposium on Security and Privacy, 515–525 (2006)
Chen, J.C., Jiang, M.C., Liu, Y.W.: Wireless LAN security & IEEE 802.11i. IEEE Wireless Communications 12, 27–36 (2005)
Edney, J., Arbaugh, W.A.: Real 802.11 security: Wi-Fi protected access and 802.11i. Addison Wesley Publishing Company, Reading (2004)
Moskowitz, R.: Weakness in passphrase choice in WPA interface (2003), http://www.wifinetnews.com/archive/002452.html
Bellardo, J., Savage, S.: 802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions. In: Proceedings of the USENIX Security Symposium, pp. 15–28 (2003)
Chen, D., Deng, J., Varshney, P.K.: Protecting wireless networks against a Denial of Service attack based on virtual jamming. In: Poster Session of MobiCom 2003, San Diego, CA (2003)
Ding, P., Holliday, J., Celik, A.: Improving the security of Wireless LANs by managing 802.1X Disassociation. In: Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, NV (2004)
Khan, M.A., Hasan, A.: Pseudo Random Number Based authentication to counter denial of service attacks on 802.11. In: The proceedings of 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2008), Surabaya, pp. 1–5 (2008)
He, C., Mitchell, C.: Analysis of the 802.11i 4-way Handshake. In: Proceedings of the ACM Workshop on Wireless Security (WiSe 2004), Philadelphia, PA, USA, pp. 43–50 (2004)
Liu1, J., Ye, X., Zhang, J., Li, J.: Security Verification of 802.11i 4-way Handshake Protocol. In: ICC proceedings, pp. 1642–1647 (2008)
Hung, C.C., Wu, E.H., Wu, C.L., Gau, R.L., Chen, Y.C.: A Multi-Key Encryption Scheme for the Next Generation Wireless Network. Journal of Computers 18(4) (2008)
Aircrack-ng tool, http://www.aircrack-ng.org/
Changhua, H., Mitchell, J.C.: Security Analysis and Improvements for IEEE 802.11i. In: 12th Annual Network and Distributed System Security Symposium, California, pp. 90–110 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yadav, D., Sardana, A. (2011). Authentication Process in IEEE 802.11: Current Issues and Challenges. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-22540-6_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22539-0
Online ISBN: 978-3-642-22540-6
eBook Packages: Computer ScienceComputer Science (R0)