Security protocol for IEEE 802.11 wireless local area network

As Wireless Local Area Networks (WLANs) are rapidly deployed to expand the field of wireless products, the provision of authentication and privacy of the information transfer will be mandatory. These functions need to take into account the inherent limitations of the WLAN medium such as limited bandwidth, noisy wireless channel and limited computational power. Moreover, some of the IEEE 802.11 WLAN characteristics such as the use of a point coordinator and the polling based Point Coordination Function (PCF) have also to be considered in this design. In this paper, we introduce a security protocol for the IEEE 802.11 PCF that provides privacy and authentication, and is designed to reduce security overheads while taking into account the WLAN characteristics. We prove this protocol using the original and modified BAN logic.

[1]  Vijay K. Garg,et al.  Wireless and Personal Communications Systems , 2000 .

[2]  Rodger E. Ziemer,et al.  Principles of communications : systems, modulation, and noise , 1985 .

[3]  B. Clifford Neuman,et al.  Security , Payment , and Privacy for Network Commerce , 1995 .

[4]  Hugo Krawczyk,et al.  Security issues in a CDPD wireless network , 1995, IEEE Wirel. Commun..

[5]  Ashar Aziz,et al.  Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.

[6]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[7]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[8]  Li Gong,et al.  Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.

[9]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[10]  Jr. Regis J. Bates,et al.  Wireless networked communications: concepts, technology, and implementation , 1994 .

[11]  F. D. Natali,et al.  Spread-spectrum technology for commercial applications , 1994 .

[12]  Hideki Imai,et al.  Information Security Aspects of Spread Spectrum Systems , 1994, ASIACRYPT.

[13]  B. Clifford Neuman,et al.  A note on the use of timestamps as nonces , 1993, OPSR.

[14]  Ross J. Anderson UEPS - A Second Generation Electronic Wallet , 1992, ESORICS.

[15]  Edward C. Prem Wireless Local Area Networks , 2000 .

[16]  Charles E. Perkins,et al.  A Mobile Host Protocol Supporting Route Optimization and Authentication , 1995, IEEE J. Sel. Areas Commun..

[17]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.