Abstract
When a client is accessing a wireless AP, many methodologies which prevent from external attack or internal information leakage using only authorized wireless AP after deciding authorized/unauthorized have proposed. But there are securities and cost problem in server based authentication, and availability problem in client based authentication. In this paper, we use MAC Address to get an authentication from an AP. It searches the NDIS Intermediate Driver from the wireless network card, and then controls the packets after operating the scope of IP and PORT. We have implemented the proposed model, and it showed no more security and cost problem. It also showed that client based authentication availability is very flexible and has high scalability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Industrial Network Team : Windows Device Driver Programming. SamYangBook, pp. 571–578 (2000)
ANSI/IEEE Std 802.11 : Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specification (1999)
Lee, J.H., Lee, M.S., Ryou, J.H.: Implementation of a Secure Wireless LAN System using AP Authentication and Dynamic Key Exchange. Korea Information Processing Society 11-C(4), 497–508 (2004)
Kwo, J.H., Park, J.T.: User Pre-Authentication Method for Support of Fast Mobility in IEEE 802.11 Wireless LAN. The Institute of Electronics of Korea 44(11), 191–200 (2007)
Kim, M.H., Lee, J.W., Choe, Y.G., Kim, S.J.: DoS-Resistance Authentication Protocol for Wireless LAN. Korea Institute of Information Security 14(5), 3–10 (2004)
Go, Y.M., Kwon, K.H.: Detecting and Isolating a Cloned Access Point IEEE 802.11. The Korea Contents Association 10(5), 45–51 (2010)
Song, C.L., Jung, B.H.: Wireless LAN Security Mechanism. Korean institute of Information Scientists and Engineers 20(4), 5–13 (2002)
IEEE Standard for Port Based Network Access control, IEEE Draft P802.1X/Dll (1998)
IEEE Standard 802.11i: Medium Access Control(MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) specifications. IEEE (2004)
Im, S.C.: A Study of Hand-off Scheme Using Mutual Authentication between APs in Wireless LAN Environments. Korean Institute of Information Technology 8(9), 95–101 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Baek, JK., Park, JP. (2011). A Study on Authentication and Access Control of Wireless Access Point. In: Kim, Th., et al. Grid and Distributed Computing. GDC 2011. Communications in Computer and Information Science, vol 261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27180-9_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-27180-9_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27179-3
Online ISBN: 978-3-642-27180-9
eBook Packages: Computer ScienceComputer Science (R0)