Investigating Authentication Mechanisms for Wireless Mobile Network

  • Binod Vaidya
  • YoungJin Kim
  • Eung-Kon Kim
  • SeungJo Han
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4159)


As the portable devices are becoming popular, the demand for ubiquitous Internet access services has grown extremely. However the increasing demand for ubiquitous services imposes more security threats to communications due to open mediums in wireless networks. The further widespread deployment of Wireless IP networks, however, depends on whether secure networking can be achieved. We propose an efficient authentication framework for wireless mobile network, which is based on one-time password (OTP) mechanism. Further we have simulated the implementation of proposed scheme and EAP-TLS and analyzed the performance in terms of various performance metrics.


Medium Access Control Access Point Authentication Scheme Authentication Protocol Mutual Authentication 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Institute of Electrical and Electronics Engineers: Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements Part 11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11-2003 (2003)Google Scholar
  2. 2.
    IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std 802.1X-2004 (December 2004)Google Scholar
  3. 3.
    Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP), IETF RFC 3748 (June 2004)Google Scholar
  4. 4.
    IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Telecommunications and information ex-change between systems - Local and metropolitan area networks - Specific requirements Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications (April 2004)Google Scholar
  5. 5.
    Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol, IETF RFC 2716 (October 1999)Google Scholar
  6. 6.
    Gast, M.: 802. 11 Wireless Networks - The Definitive Guide. O’Reilly, Sebastopol (2002)Google Scholar
  7. 7.
    Baek, K.H., Smith, S.W., Kotz, D.: A Survey of WPA and 802.11i RSN Authentication Protocols, Dartmouth College Computer Science, Technical Report TR2004-524 (November 2004)Google Scholar
  8. 8.
    Potter, B., Fleck, B.: 802. 11 Security. O’Reilly, Sebastopol (2002)Google Scholar
  9. 9.
    Edney, J., Arbaugh, W.A.: Real 802.11 Security - Wi-Fi Protected Access and 802.11i. Addison-Wesley, Reading (2003)Google Scholar
  10. 10.
    Lamport, L.: Password Authentication with insecure communication. Communications of the ACM 24(11), 722–770 (1981)CrossRefMathSciNetGoogle Scholar
  11. 11.
    Haller, N.: The S/KEY One-Time Password System. In: Proc. of the Symposium on Network and Distributed Systems Security, Internet Society, CA, USA (February 1994)Google Scholar
  12. 12.
    Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System, IETF RFC 2289 (February 1998)Google Scholar
  13. 13.
    Blunk, L., Vollbrecht, J., Aboba, B.: The One Time Password (OTP) and Generic Token Card Authentication Protocols, Internet draft <draft-ietf-eap-otp-00.txt>Google Scholar
  14. 14.
    OPNET Modeler Simulation Software,
  15. 15.
    Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)CrossRefGoogle Scholar
  16. 16.
    Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proc. of the Tenth Annual ACM Symposium on Principles of Distributed Computing, pp. 201–216 (August 1991)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Binod Vaidya
    • 1
  • YoungJin Kim
    • 2
  • Eung-Kon Kim
    • 3
  • SeungJo Han
    • 4
  1. 1.Dept. of Electronics & Computer EngTribhuvan Univ.Nepal
  2. 2.DACOM CorporationKorea
  3. 3.Dept. of Computer ScienceSunchon National Univ.Korea
  4. 4.Dept. of Information & Communication EngChosun Univ.Korea

Personalised recommendations