Skip to main content

Authentication Process in IEEE 802.11: Current Issues and Challenges

  • Conference paper
Book cover Advances in Network Security and Applications (CNSA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 196))

Included in the following conference series:

  • 2346 Accesses

Abstract

Authentication is a challenging area in wireless networks. The authentication process of IEEE 802.11i is using the standards of IEEE 802.1X for authentication; and for key management and distribution 4-way handshake protocol is used. In this paper, we exhaustively review the authentication technique in IEEE 802.11i. The work presents a security analysis of authentication technique which shows its strengths against various threats and some flaws which are responsible for security breaches. The paper compares and contrasts the techniques and points out current issues and challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hiertz, G., Denteneer, D., Stibor, L., Zang, Y., Costa, X.P., Walke, B.: The IEEE 802.11 universe. IEEE Communications Magazine 48, 62–70 (2010)

    Article  Google Scholar 

  2. Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Arbaugh, W.A., Shankar, N., Wan, Y.C.J., Zhang, K.: Your 802.11 wireless network has no clothes. IEEE Wireless Communications 9, 44–51 (2002)

    Article  Google Scholar 

  4. Cam-Winget, N., Housley, R., Wagner, D., Walker, J.: Security flaws in 802.11 data link protocols. Communications of the ACM 46, 35–39 (2003)

    Article  Google Scholar 

  5. Walker, J.: Unsafe at any key size: An analysis of the WEP encapsulation. IEEE document 802, 362 (2000)

    Google Scholar 

  6. Manley, M.E., McEntee, C.A., Molet, A.M., Park, J.S.: Wireless security policy development for sensitive organizations. IEEE Information assurance and security 25, 150–157 (2005)

    Google Scholar 

  7. Bittau, A., Handley, M., Lackey, J.: The final nail in WEP’s coffin. Proceedings of the 2006 IEEE Symposium on Security and Privacy, 515–525 (2006)

    Google Scholar 

  8. Chen, J.C., Jiang, M.C., Liu, Y.W.: Wireless LAN security & IEEE 802.11i. IEEE Wireless Communications 12, 27–36 (2005)

    Article  Google Scholar 

  9. Edney, J., Arbaugh, W.A.: Real 802.11 security: Wi-Fi protected access and 802.11i. Addison Wesley Publishing Company, Reading (2004)

    Google Scholar 

  10. Moskowitz, R.: Weakness in passphrase choice in WPA interface (2003), http://www.wifinetnews.com/archive/002452.html

  11. Bellardo, J., Savage, S.: 802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions. In: Proceedings of the USENIX Security Symposium, pp. 15–28 (2003)

    Google Scholar 

  12. Chen, D., Deng, J., Varshney, P.K.: Protecting wireless networks against a Denial of Service attack based on virtual jamming. In: Poster Session of MobiCom 2003, San Diego, CA (2003)

    Google Scholar 

  13. Ding, P., Holliday, J., Celik, A.: Improving the security of Wireless LANs by managing 802.1X Disassociation. In: Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, NV (2004)

    Google Scholar 

  14. Khan, M.A., Hasan, A.: Pseudo Random Number Based authentication to counter denial of service attacks on 802.11. In: The proceedings of 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2008), Surabaya, pp. 1–5 (2008)

    Google Scholar 

  15. He, C., Mitchell, C.: Analysis of the 802.11i 4-way Handshake. In: Proceedings of the ACM Workshop on Wireless Security (WiSe 2004), Philadelphia, PA, USA, pp. 43–50 (2004)

    Google Scholar 

  16. Liu1, J., Ye, X., Zhang, J., Li, J.: Security Verification of 802.11i 4-way Handshake Protocol. In: ICC proceedings, pp. 1642–1647 (2008)

    Google Scholar 

  17. Hung, C.C., Wu, E.H., Wu, C.L., Gau, R.L., Chen, Y.C.: A Multi-Key Encryption Scheme for the Next Generation Wireless Network. Journal of Computers 18(4) (2008)

    Google Scholar 

  18. Aircrack-ng tool, http://www.aircrack-ng.org/

  19. Changhua, H., Mitchell, J.C.: Security Analysis and Improvements for IEEE 802.11i. In: 12th Annual Network and Distributed System Security Symposium, California, pp. 90–110 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yadav, D., Sardana, A. (2011). Authentication Process in IEEE 802.11: Current Issues and Challenges. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22540-6_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22539-0

  • Online ISBN: 978-3-642-22540-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics