CFP last date
20 December 2024
Reseach Article

SAKGP: Secure Authentication Key Generation Protocol in WLAN

by Latha P. H, Vasantha R
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 7
Year of Publication: 2014
Authors: Latha P. H, Vasantha R
10.5120/16807-6537

Latha P. H, Vasantha R . SAKGP: Secure Authentication Key Generation Protocol in WLAN. International Journal of Computer Applications. 96, 7 ( June 2014), 25-33. DOI=10.5120/16807-6537

@article{ 10.5120/16807-6537,
author = { Latha P. H, Vasantha R },
title = { SAKGP: Secure Authentication Key Generation Protocol in WLAN },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 7 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number7/16807-6537/ },
doi = { 10.5120/16807-6537 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:21:08.469588+05:30
%A Latha P. H
%A Vasantha R
%T SAKGP: Secure Authentication Key Generation Protocol in WLAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 7
%P 25-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless LAN is one of the cost effective way to establish local networking as compared to wired network. Although the last decade has seen various sophisticated WLAN routers and devices, but few of them are actually found to be highly resilient against potential attacks on WLAN. Literatures also share evidence that such issues are yet unsolved and call for a serious modeling of issues and testing the security efficiencies. The prime reason behind this is the incapability of the existing security protocols to ensure reliable authentication system. Hence, this study presents a technique that uses the most recent versions of cryptographic hash functions to ensure the bidirectional authentication between the nodes and WLAN router. Finally, the paper discusses about mathematical modeling of the presented security protocol as well as accomplished results are compared with the existing system.

References
  1. http://www. gsmarena. com/glossary. php3?term=wi-fi
  2. A. E. Earle, "Wireless Security Handbook," Auerbach Publications, pp. 348, 2005
  3. "National Institute of Standards and Technology NIST 800-97", retrieved from Establishing Wireless Robust Security Networks: A Guide to IEEE 802. 11i, http://csrc. nist. gov/publications/nistpubs/800-97/SP800-97. pdf
  4. B. Mitchell, "WPA - Wi-Fi Protected Access An Article from Computing", Wireless/networking. Retreived from http://compnetworking. about. com/cs/wirelesssecurity/g/bldef_wpa. htm, 2004
  5. Latha. P H, Vasantha R, Review of Existing Security Protocols Techniques and their Performance Analysis in WLAN, International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), Vol. 7, pp. 162-171, December 2013
  6. I. P. Mavridis, A-I. E. Androulakis, A. B. Halkias, P. Mylonas, "Real-Life Paradigms of Wireless Network Security Attacks," Informatics (PCI), 2011 15th Panhellenic Conference, pp. 112-116, 2011
  7. F. Haddadi, M. A. Sarram, "Wireless Intrusion Detection System Using a Lightweight Agent," Computer and Network Technology (ICCNT), 2010 Second International Conference, pp. 84-87, 2010
  8. O. N. Odhiambo, E. Biermann, G. Noel, "An integrated security model for WLAN," AFRICON, 2009. AFRICON '09. Pp. 1-6, 2009
  9. A. Bittau, M. Handley, J. Lackey, "The final nail in WEP's coffin," Security and Privacy, 2006 IEEE Symposium, pp. 15-400, 2006
  10. Y. Liu, Z. Jin, Y. Wang, "Survey on Security Scheme and Attacking Methods of WPA/WPA2," Wireless Communications Networking and Mobile Computing (WiCOM), 6th International Conference, pp. 1-4, 2010
  11. A. T. Sherman, B. O. Roberts, W. E. Byrd, M. R. Baker, J. Simmons"Developing and delivering hands-on information assurance exercises: experiences with the cyber defense lab at UMBC," Information Assurance Workshop, Proceedings from the Fifth Annual IEEE SMC , pp. 242-249, 2004
  12. M. Jagetia, T. Kocak, "A novel scrambling algorithm for a robust WEP implementation [wired equivalent privacy protocol," Vehicular Technology Conference, IEEE 59th , vol. 5, pp. 2487-2491, 2004
  13. T. Tsukaune, Y. Todo, M. Morii, "Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation," Information Security (Asia JCIS), Seventh Asia Joint Conference, pp. 25-30, 2012
  14. N. Phil, A. P. Horrocks. "Vulnerability of IEEE802. 11 WLANs to MAC layer DoS attacks. " pp. 14-14, 2004
  15. Y. Omar, M. Youssef, E. H. Gamal,"ARQ secrecy: From theory to practice," Information Theory Workshop, ITW. IEEE, pp. 6-10, 2009
  16. S. A. Pattar, Detection Of Rogue Access Points Present In The Wlan At The Server Side, Proceedings of IRF International Conference, 2014
  17. S. Q. Wang, J. Y. Wang, Y. Z. Li, "The Web Security Password Authentication based the Single-Block Hash Function", Elsevier, 2013
  18. Z-Y Wu, Y. Chung, F. Lai, T-S Chen, and H-C Lee, "An Enhanced Password-Based User Authentication Scheme For Grid Computing, An Enhanced Password-Based User Authentication Scheme For Grid Computing", Volume 7, Number 7(A), pp. 3751-3760, 2011
  19. C. K. Kumar, C. Suyambulingom, "Multicollisions and iterated Cryptography hash functions", Journal of Computing Technologies Vol 2, Issue 3 ISSN 2278 – 3814, 2013
  20. H. Delfs, H. Knebl, "Introduction to Cryptography: Principles and Applications", Springer, Computers, 367 pages, 2007
  21. H. F. Tipton, M. Krause, "Information Security Management Handbook", Fifth Edition, CRC Press, Computers, 2036 pages, 2004.
  22. http://www. emc. com/emc-plus/rsa-labs/historical/hash-function-update-potential-weakness-in-sha1. htm
  23. http://www. entrust. net/knowledge-base/technote. cfm?tn=8526
  24. http://keccak. noekeon. org/
  25. http://www. cs. umd. edu/class/sum2003/cmsc311/Notes/Data/endian. html
  26. http://en. wikipedia. org/wiki/Circular_shift
  27. X. Zheng, C. Chen, C-T Huang, A Dual Authentication Protocol for IEEE 802. 11 Wireless LANs, pp. 565-569, IEEE, 2005
  28. B. A. Kumar, K. Kavuri, "Novel approach for preventing hackers in data communication", International Journal of Computer Science and Advanced Computing, Vol. 1, Iss. 1, April. 2013
  29. J. Friesen, "Learn Java for Android Development", A press, Computers, 806 pages, 2013
  30. N. Nagaratnam, L. Koved, A. Nadalin, "Enterprise Java Security: Building Secure J2EE Applications", Addison-Wesley Professional, Computers, 581 pages, 2004
Index Terms

Computer Science
Information Sciences

Keywords

Wireless LAN Cryptographic Hash Security Authentication IEEE 802. 11