Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Authentication

Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_290-1
  • 85 Downloads

Synonyms

Definitions

Authentication methods in wireless networks allow the wireless access point (AP) or broadband wireless router to authorize individuals and devices, and only those who get authorized can access the network. For maximum security, client devices should also authenticate to the wireless network using pre-shared key (PSK) or Extensible Authentication Protocol (EAP) authentication. The use of mutual authentication is essential in a wireless network. This will guard against many security issues, such as man-in-the-middle (MITM) attacks. With authentication, the wireless client and the wireless AP must prove their identity to each other.

Historical Background

When setting up a wireless network, the network administrator has to have some way to ensure that wireless clients, and the devices they are using, are trusted. A typical solution to this question is to use a standard kind of authentication, which in today’s...

This is a preview of subscription content, log in to check access.

References

  1. Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of rc4. In: International workshop on selected areas in cryptography. Springer, Berlin, Heidelberg, pp 1–24zbMATHGoogle Scholar
  2. IEEE (1999) Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 80211Google Scholar
  3. Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing. Springer, Boston, MA, pp 153–181Google Scholar
  4. Stubblefield A, Ioannidis J, Rubin AD (2002, February) Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, USAGoogle Scholar
  5. Tews E, Beck M (2009) Practical attacks against WEP and WPA. In: Proceedings of the second ACM conference on Wireless network security (WiSec ’09).ACM, New York, NY, USA, 79–86. https://doi.org/10.1145/1514274.1514286
  6. Vanhoef M, Piessens F (2017) Key reinstallation attacks: Forcing nonce reuse in wpa2. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, Dallas, Texas, USA, pp 1313–1328Google Scholar

Authors and Affiliations

  1. 1.West Chester UniversityWest ChesterUSA

Section editors and affiliations

  • Kui Ren

There are no affiliations available