Skip to main content

Authentication

  • Living reference work entry
  • First Online:
Encyclopedia of Wireless Networks
  • 102 Accesses

Synonyms

802.11; 802.1x; Wireless credentials; WLAN authentication

Definitions

Authentication methods in wireless networks allow the wireless access point (AP) or broadband wireless router to authorize individuals and devices, and only those who get authorized can access the network. For maximum security, client devices should also authenticate to the wireless network using pre-shared key (PSK) or Extensible Authentication Protocol (EAP) authentication. The use of mutual authentication is essential in a wireless network. This will guard against many security issues, such as man-in-the-middle (MITM) attacks. With authentication, the wireless client and the wireless AP must prove their identity to each other.

Historical Background

When setting up a wireless network, the network administrator has to have some way to ensure that wireless clients, and the devices they are using, are trusted. A typical solution to this question is to use a standard kind of authentication, which in today’s...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of rc4. In: International workshop on selected areas in cryptography. Springer, Berlin, Heidelberg, pp 1–24

    MATH  Google Scholar 

  • IEEE (1999) Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 80211

    Google Scholar 

  • Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing. Springer, Boston, MA, pp 153–181

    Google Scholar 

  • Stubblefield A, Ioannidis J, Rubin AD (2002, February) Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, USA

    Google Scholar 

  • Tews E, Beck M (2009) Practical attacks against WEP and WPA. In: Proceedings of the second ACM conference on Wireless network security (WiSec ’09).ACM, New York, NY, USA, 79–86. https://doi.org/10.1145/1514274.1514286

  • Vanhoef M, Piessens F (2017) Key reinstallation attacks: Forcing nonce reuse in wpa2. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, Dallas, Texas, USA, pp 1313–1328

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Si Chen .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Chen, S. (2019). Authentication. In: Shen, X., Lin, X., Zhang, K. (eds) Encyclopedia of Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-32903-1_290-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32903-1_290-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32903-1

  • Online ISBN: 978-3-319-32903-1

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics