A secure n-secret based client authentication protocol for 802.11 WLANs
Pawan Kumar () and
Dinesh Kumar ()
Additional contact information
Pawan Kumar: IKG PTU
Dinesh Kumar: DAV Institute of Engineering and Technology
Telecommunication Systems: Modelling, Analysis, Design and Management, 2020, vol. 75, issue 3, No 2, 259-271
Abstract:
Abstract Authentication has strong impact on the overall security model of every information system. Various authentication techniques are available for restricting the access of unauthorized users to the enterprise scale networks. IEEE 802.1X defines a secure and reliable authentication framework for 802.11 WLANs, where Extensible Authentication Protocol (EAP) provides the base to this architecture. EAP is a generic architectural framework which supports extensibility by incorporating the new and improved authentication schemes, which are based on different types of credentials. Currently there exist a number of EAP and Non-EAP methods with varying level of security and complexity. In this work, we have designed a new n-secret based authentication scheme referred here as Personal Dialogue Based Authentication, for the client authentication to the network. It is a Transport Layer Security (TLS) protected authentication protocol, which will be executed inside the secure TLS tunnel for providing the privacy and credential security to the wireless client. The developed authentication protocol has a reasonable set of features like; strong security, user privacy, simplicity and extensibility. For the formal analysis of the protocol we have used SPAN–AVISAP model checker on Ubuntu platform for validating the realization of the specified security goals. The experimental results obtained by simulation performed with the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows that our protocol is efficient and secured.
Keywords: Information security; Authentication; WLAN; EAP; 802.1X (search for similar items in EconPapers)
Date: 2020
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s11235-020-00683-9 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:75:y:2020:i:3:d:10.1007_s11235-020-00683-9
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-020-00683-9
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().