Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network

IEEE 802.11i standard supports a secure access control for wireless LAN and IEEE 802.1x standard includes various authentication method protocols. It is expected that next generation wireless LAN security techniques will be based on IEEE 802.1x and IEEE 802.11i standards. However, at present users who are not familiar with a computer and an authentication details have difficulty to setup the network security based on IEEE 802.11i. Accordingly, this paper proposes authentication scenarios to minimize the process needed by users, a password method which is changed randomly and periodically, and authentication protocols. The proposed protocols provide convenience for nonprofessional computer users as well as secure the home network environment against the unwanted attacks such as a dictionary attack or a replay attack and it uses SNMP and the system to be able to detect an intrusion it supposes will occur.

[1]  Jae-Hyun Kim,et al.  A Secure Wireless LAN Access Technique for Home Network , 2006, 2006 IEEE 63rd Vehicular Technology Conference.

[2]  Keith McCloghrie SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2 , 1996, RFC.

[3]  Doug Potter,et al.  PPP EAP MS-CHAP-V2 Authentication Protocol , 2002 .

[4]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[5]  Hui Luo,et al.  A secure public wireless LAN access technique that supports walk-up users , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[6]  Simon Blake-Wilson,et al.  EAP Tunneled TLS Authentication Protocol (EAP-TTLS) , 2004 .

[7]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[8]  Shang-Juh Kao,et al.  Security Gateway for Accessing IPv6 WLAN , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[9]  Jeffrey D. Case,et al.  Simple Network Management Protocol (SNMP) , 1989, RFC.

[10]  Rajiv Raghunarayan,et al.  Management Information Base for the Transmission Control Protocol (TCP) , 2005, Request for Comments.

[11]  Brian Haberman,et al.  IP Forwarding Table MIB , 2006, RFC.

[12]  Keith McCloghrie SNMPv2 Management Information Base for the Internet Protocol using SMIv2 , 1996, RFC.

[13]  Jeffrey D. Case,et al.  Simple network management protocol , 1995 .

[14]  Jyh-Cheng Chen,et al.  Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience , 2005, IEEE Commun. Mag..

[15]  Keith McCloghrie SNMPv2 Management Information Base for the User Datagram Protocol using SMIv2 , 1996, RFC.

[16]  John C. Mitchell,et al.  Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.

[17]  William Allen Simpson,et al.  PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.