Skip to main content

A Study on Authentication and Access Control of Wireless Access Point

  • Conference paper
Grid and Distributed Computing (GDC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 261))

Included in the following conference series:

  • 1537 Accesses

Abstract

When a client is accessing a wireless AP, many methodologies which prevent from external attack or internal information leakage using only authorized wireless AP after deciding authorized/unauthorized have proposed. But there are securities and cost problem in server based authentication, and availability problem in client based authentication. In this paper, we use MAC Address to get an authentication from an AP. It searches the NDIS Intermediate Driver from the wireless network card, and then controls the packets after operating the scope of IP and PORT. We have implemented the proposed model, and it showed no more security and cost problem. It also showed that client based authentication availability is very flexible and has high scalability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Industrial Network Team : Windows Device Driver Programming. SamYangBook, pp. 571–578 (2000)

    Google Scholar 

  2. ANSI/IEEE Std 802.11 : Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specification (1999)

    Google Scholar 

  3. Lee, J.H., Lee, M.S., Ryou, J.H.: Implementation of a Secure Wireless LAN System using AP Authentication and Dynamic Key Exchange. Korea Information Processing Society 11-C(4), 497–508 (2004)

    Google Scholar 

  4. Kwo, J.H., Park, J.T.: User Pre-Authentication Method for Support of Fast Mobility in IEEE 802.11 Wireless LAN. The Institute of Electronics of Korea 44(11), 191–200 (2007)

    Google Scholar 

  5. Kim, M.H., Lee, J.W., Choe, Y.G., Kim, S.J.: DoS-Resistance Authentication Protocol for Wireless LAN. Korea Institute of Information Security 14(5), 3–10 (2004)

    Google Scholar 

  6. Go, Y.M., Kwon, K.H.: Detecting and Isolating a Cloned Access Point IEEE 802.11. The Korea Contents Association 10(5), 45–51 (2010)

    Article  Google Scholar 

  7. Song, C.L., Jung, B.H.: Wireless LAN Security Mechanism. Korean institute of Information Scientists and Engineers 20(4), 5–13 (2002)

    MathSciNet  Google Scholar 

  8. IEEE Standard for Port Based Network Access control, IEEE Draft P802.1X/Dll (1998)

    Google Scholar 

  9. IEEE Standard 802.11i: Medium Access Control(MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) specifications. IEEE (2004)

    Google Scholar 

  10. Im, S.C.: A Study of Hand-off Scheme Using Mutual Authentication between APs in Wireless LAN Environments. Korean Institute of Information Technology 8(9), 95–101 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Baek, JK., Park, JP. (2011). A Study on Authentication and Access Control of Wireless Access Point. In: Kim, Th., et al. Grid and Distributed Computing. GDC 2011. Communications in Computer and Information Science, vol 261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27180-9_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27180-9_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27179-3

  • Online ISBN: 978-3-642-27180-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics