Abstract
As the portable devices are becoming popular, the demand for ubiquitous Internet access services has grown extremely. However the increasing demand for ubiquitous services imposes more security threats to communications due to open mediums in wireless networks. The further widespread deployment of Wireless IP networks, however, depends on whether secure networking can be achieved. We propose an efficient authentication framework for wireless mobile network, which is based on one-time password (OTP) mechanism. Further we have simulated the implementation of proposed scheme and EAP-TLS and analyzed the performance in terms of various performance metrics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Institute of Electrical and Electronics Engineers: Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements Part 11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11-2003 (2003)
IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std 802.1X-2004 (December 2004)
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP), IETF RFC 3748 (June 2004)
IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Telecommunications and information ex-change between systems - Local and metropolitan area networks - Specific requirements Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications (April 2004)
Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol, IETF RFC 2716 (October 1999)
Gast, M.: 802. 11 Wireless Networks - The Definitive Guide. O’Reilly, Sebastopol (2002)
Baek, K.H., Smith, S.W., Kotz, D.: A Survey of WPA and 802.11i RSN Authentication Protocols, Dartmouth College Computer Science, Technical Report TR2004-524 (November 2004)
Potter, B., Fleck, B.: 802. 11 Security. O’Reilly, Sebastopol (2002)
Edney, J., Arbaugh, W.A.: Real 802.11 Security - Wi-Fi Protected Access and 802.11i. Addison-Wesley, Reading (2003)
Lamport, L.: Password Authentication with insecure communication. Communications of the ACM 24(11), 722–770 (1981)
Haller, N.: The S/KEY One-Time Password System. In: Proc. of the Symposium on Network and Distributed Systems Security, Internet Society, CA, USA (February 1994)
Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System, IETF RFC 2289 (February 1998)
Blunk, L., Vollbrecht, J., Aboba, B.: The One Time Password (OTP) and Generic Token Card Authentication Protocols, Internet draft <draft-ietf-eap-otp-00.txt>
OPNET Modeler Simulation Software, http://www.opnet.com
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proc. of the Tenth Annual ACM Symposium on Principles of Distributed Computing, pp. 201–216 (August 1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vaidya, B., Kim, Y., Kim, EK., Han, S. (2006). Investigating Authentication Mechanisms for Wireless Mobile Network. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_92
Download citation
DOI: https://doi.org/10.1007/11833529_92
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38091-7
Online ISBN: 978-3-540-38092-4
eBook Packages: Computer ScienceComputer Science (R0)