- 85 Downloads
Authentication methods in wireless networks allow the wireless access point (AP) or broadband wireless router to authorize individuals and devices, and only those who get authorized can access the network. For maximum security, client devices should also authenticate to the wireless network using pre-shared key (PSK) or Extensible Authentication Protocol (EAP) authentication. The use of mutual authentication is essential in a wireless network. This will guard against many security issues, such as man-in-the-middle (MITM) attacks. With authentication, the wireless client and the wireless AP must prove their identity to each other.
When setting up a wireless network, the network administrator has to have some way to ensure that wireless clients, and the devices they are using, are trusted. A typical solution to this question is to use a standard kind of authentication, which in today’s...
- IEEE (1999) Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 80211Google Scholar
- Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing. Springer, Boston, MA, pp 153–181Google Scholar
- Stubblefield A, Ioannidis J, Rubin AD (2002, February) Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, USAGoogle Scholar
- Tews E, Beck M (2009) Practical attacks against WEP and WPA. In: Proceedings of the second ACM conference on Wireless network security (WiSec ’09).ACM, New York, NY, USA, 79–86. https://doi.org/10.1145/1514274.1514286
- Vanhoef M, Piessens F (2017) Key reinstallation attacks: Forcing nonce reuse in wpa2. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, Dallas, Texas, USA, pp 1313–1328Google Scholar