CFP last date
20 December 2024
Reseach Article

Fast and Secure Authentication Using Double Token based Scheme for WLANs

by Poonam Jindal, Brahmjit Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 8
Year of Publication: 2013
Authors: Poonam Jindal, Brahmjit Singh
10.5120/10101-4748

Poonam Jindal, Brahmjit Singh . Fast and Secure Authentication Using Double Token based Scheme for WLANs. International Journal of Computer Applications. 62, 8 ( January 2013), 25-32. DOI=10.5120/10101-4748

@article{ 10.5120/10101-4748,
author = { Poonam Jindal, Brahmjit Singh },
title = { Fast and Secure Authentication Using Double Token based Scheme for WLANs },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 8 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 25-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number8/10101-4748/ },
doi = { 10.5120/10101-4748 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:15.278522+05:30
%A Poonam Jindal
%A Brahmjit Singh
%T Fast and Secure Authentication Using Double Token based Scheme for WLANs
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 8
%P 25-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication can provide security by preventing unauthorized usage and negotiating the credentials for secure communication. Nevertheless, it induces heavy overhead to communications, further deteriorating the quality of service (QoS). Analyzing QoS and security impact of authentication, therefore, becomes critical to developing efficient authentication schemes. In this paper, we propose a system model for the analysis of challenge/response authentication in wireless networks. In the proposed double token based fast authentication scheme, one token is generated in the registration phase and second in the authentication phase which provides another layer of security to the authentication scheme. All the keys are exchanged during the registration phase. This makes the security parameters known only to the mobile client (MC), authenticator and authentication server (AS). Attackers would be unable to know the token and other secret keys because they are shared only during the registration phase. This makes the authentication scheme highly secure. The number of key exchanges that takes place during authentication phase is less, which makes the authentication fast as compared to Extensible Authentication Protocol (EAP) authentication where all messages are exchanged during the authentication phase. The proposed scheme results in fast authentication without compromising the security of wireless networks.

References
  1. Russ Housley, William Arbaugh, "Security Problems in 802. 11- Based Networks". Communications of the ACM, Vol. 46, No. 5, May 2003, pp 31-34. G.
  2. William Stallings, "Cryptography and Network Security, Principles and Practices," 4rth Edition, Prentice Hall 2007.
  3. Fluhrer, S. ; & Shamir, A. "Weaknesses in Key Schedule Algorithm of RC4". Workshop on Selected Areas of Cryptography, 2001.
  4. Arbaugh, W. A. ; & Shankar, N. "Your Wireless Network Has No Clothes". First International Conference on Wireless LANs, Singapore, March 2001, pp. 131-44.
  5. Borisov, N. ; & Wagner, D. "Intercepting Mobile Communications: The Insecurity of 802. 11". International Conference on Mobile Computing and Networking, July 2001, pp. 180-89.
  6. Allam Mousa, Ahmad Hamad, "Evaluation of RC4 Algorithm for Data Encryption". International Journal of Computer Science and Applications, Vol. 3, No. 2, June 2006, pp 44-56.
  7. LAN MAN Standards of the IEEE Computer Society, "Wireless LAN Medium Access Control and Physical Layer Specifications, Medium Access Control Security Enhancement". IEEE Standard 802. 11i, 2004.
  8. B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, Extensible Authentication Protocol (EAP), Ed. , RFC 3748, Internet Society, Jun. 2004.
  9. K. M. Ali and T. J. Owens, "Selection of an EAP authentication method for a WLAN," International Journal of Information and Computer Security, vol. 1, no. 1/2, pp. 210-233, 2007.
  10. P. Funk and S. Blake-Wilson, "EAP Tunneled TLS Authentication Protocol Version 1 (EAP-TTLSv1)", The Internet Society, Mar. 2006.
  11. V. Kamath, A. Palekar, and M. Wodrich, Microsoft's PEAP version 0 (Implementation in Windows XP SP1), The Internet Society, Oct. 2002.
  12. B. Brown, "802. 11: The Security Differences Between b and i". Potentials IEEE, Vol. 22, Issue 4, Oct-Nov 2003, pp 23-27.
  13. H. Altunbasak, H. Owan, "Alternative Pair Wise Key Exchange Protocol for Robust Security Networks (IEEE 802. 11i) in Wireless LANs". Proceedings Southeast Conference, IEEE, 26-29 March, pp 77-8.
  14. M. Arunesh, A. W. Arbaugh, "An Initial Analysis of the IEEE 802. 1X Standard". Department of Computer Science, University of Maryland, CS-TR4328, 2002, pp 1-12.
  15. Ghassan Kbar, "Wireless Network Token Based Fast Authentication" International Conference on Telecommunications, 2010, pp227-233.
  16. Poonam Jindal, Brahmjit Singh "Performance Evaluation of Token Based Authentication Scheme for WLANs" Conference on Advancements in Communication & Computing Systems "COMMUNE CACCS-2012, held at I. T. S. Engineering College. Gr. NOIDA on March 24-25, 2012, pp 68-75
Index Terms

Computer Science
Information Sciences

Keywords

EAP Token based authentication WLAN