Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN

  • Binod Vaidya
  • SangDuck Lee
  • Jae-Kyun Han
  • SeungJo Han
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3967)


Wireless local area networks (WLANs) are quickly becoming ubiquitous in our every day life. The increasing demand for ubiquitous services imposes more security threats to communications due to open mediums in wireless networks. The further widespread deployment of WLANs, however, depends on whether secure networking can be achieved. We propose a simple scheme for implementing authentication based on the One-Time Password (OTP) mechanism. The authentication protocol is proposed to solve the weak authentication and security flaw problem of the WEP in 802.11 WLAN. Further we have simulated the implementation of proposed scheme and EAP-OTP and analyzed the performance in terms of different performance metrics such as response time and authentication delay.


Medium Access Control Access Point Wireless Local Area Network Mutual Authentication Replay Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Institute of Electrical and Electronics Engineers: Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements Part 11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11-2003 (2003)Google Scholar
  2. 2.
    Gast, M.: 802.11 Wireless Networks - The Definitive Guide, December 2002. O’Reilly, Sebastopol (2002)Google Scholar
  3. 3.
    Potter, B., Fleck, B.: 802.11 Security, December 2002. O’Reilly, Sebastopol (2002)Google Scholar
  4. 4.
    Arbaugh, W.A., Shankar, N., Justin Wan, Y.C.: Your 802.11 wireless network has no clothes. IEEE Wireless Communications 9, 44–51 (2002)CrossRefGoogle Scholar
  5. 5.
    Walker, J.R.: Unsafe at any key size - an analysis of the WEP encapsulation, 802.11 Security Papers at (October 2000),
  6. 6.
    Edney, J., Arbaugh, W.A.: Real 802.11 Security - Wi-Fi Protected Access and 802.11i, July 2003. Addison-Wesley, Reading (2003)Google Scholar
  7. 7.
    Cox, P.: Robust Security Network - The future of wireless security, System Experts Corporation,
  8. 8.
    Baek, K.H., Smith, S.W., Kotz, D.: A Survey of WPA and 802.11i RSN Authentication Protocols, Dartmouth College Computer Science, Technical Report TR2004-524 (November 2004)Google Scholar
  9. 9.
    Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System, IETF RFC 2289 (February 1998)Google Scholar
  10. 10.
    Lamport, L.: Password Authentication with insecure communication. Communications of the ACM 24(11), 722–770 (1981)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP), IETF RFC 3748 (June 2004)Google Scholar
  12. 12.
    Haller, N.: The S/KEY One-Time Password System. In: Proc. of the Symposium on Network and Distributed Systems Security, Internet Society, CA, USA (February 1994)Google Scholar
  13. 13.
    Blunk, L., Vollbrecht, J., Aboba, B.: The One Time Password (OTP) and Generic Token Card Authentication Protocols, Internet draft <draft-ietf-eap-otp-00.txt>Google Scholar
  14. 14.
    OPNET Modeler Simulation Software,
  15. 15.
    Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)CrossRefMATHGoogle Scholar
  16. 16.
    Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proc. of the Tenth Annual ACM Symposium on Principles of Distributed Computing, August 1991, pp. 201–216 (1991)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Binod Vaidya
    • 1
  • SangDuck Lee
    • 2
  • Jae-Kyun Han
    • 3
  • SeungJo Han
    • 2
  1. 1.Dept. of Electronics & Computer EngTribhuvan Univ.Nepal
  2. 2.Dept. of Information & Communication EngChosun Univ.Korea
  3. 3.Korea National Open Univ.Korea

Personalised recommendations