Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service

  • Hyung-Woo Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4555)


In a wireless network that uses 802.1X Port Access Control, the wireless station plays the role of the Remote User and the wireless AP plays the role of the Network Access Server (NAS). However, Security problem for user authentication has been increased on existing IEEE 802.11 wireless network. However, brute force dictionary attack can be launched against the shared secret on existing IEEE802.1x (EAP-MD5, EAP-TLS, EAP-TTLS) protocols or security systems. Therefore, we overview main problem on existing EAP-MD5 authentication mechanism on Wireless LAN and propose a SMS(Short Message Service) based secure authentication and accounting mechanism for providing security enhanced wireless network transactions against those attacks.


Wireless Network Access Point Authentication Server Certification System Account Mechanism 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wireless LAN Security Interoperabillity Lab, What are EAP Authentication, pp. 1–2Google Scholar
  2. 2.
    Yoon, J.-H.: Wireless LAN Security Protocols, pp. 282–283 (2005. 08)Google Scholar
  3. 3.
    Phillips Craiger J.: 802.11, 802.1x, and Wireless Security (2002. 06)Google Scholar
  4. 4.
    Trappe, W., Washington, L.C. (eds.): Introduction to CRYPTOGRAPHY with CODING THEORY, pp. 128–136. Prentice Hall, Englewood Cliffs (2001.03)Google Scholar
  5. 5.
    Beaver, K., Davis, P.T.: Hacking Wireless Networks for DUMMIES, p. 208. Wiley, Chichester (2005)Google Scholar
  6. 6.
    Andrew, A., Vladimirov, K.V., Gavrilenko, A.A.: Wi-Foo, p. 182. Addison-Wesley, London (2005)Google Scholar
  7. 7.
    Wang, X., Yu, H.: Shandong University, How to Break MD5 and Other Hash FunctionGoogle Scholar
  8. 8.
    Buchholz, J.J.: Matlab Implementation of the Advanced Encryption Standard (2001.11),

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Hyung-Woo Lee
    • 1
  1. 1.Div. of Computer, Information and Software, Hanshin University, 411, Yangsan-dong, Osan, Gyunggi, 447-791Korea

Personalised recommendations