Synonyms
Definitions
Authentication methods in wireless networks allow the wireless access point (AP) or broadband wireless router to authorize individuals and devices, and only those who get authorized can access the network. For maximum security, client devices should also authenticate to the wireless network using pre-shared key (PSK) or Extensible Authentication Protocol (EAP) authentication. The use of mutual authentication is essential in a wireless network. This will guard against many security issues, such as man-in-the-middle (MITM) attacks. With authentication, the wireless client and the wireless AP must prove their identity to each other.
Historical Background
When setting up a wireless network, the network administrator has to have some way to ensure that wireless clients, and the devices they are using, are trusted. A typical solution to this question is to use a standard kind of authentication, which in today’s...
References
Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of rc4. In: International workshop on selected areas in cryptography. Springer, Berlin, Heidelberg, pp 1–24
IEEE (1999) Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 80211
Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing. Springer, Boston, MA, pp 153–181
Stubblefield A, Ioannidis J, Rubin AD (2002, February) Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, USA
Tews E, Beck M (2009) Practical attacks against WEP and WPA. In: Proceedings of the second ACM conference on Wireless network security (WiSec ’09).ACM, New York, NY, USA, 79–86. https://doi.org/10.1145/1514274.1514286
Vanhoef M, Piessens F (2017) Key reinstallation attacks: Forcing nonce reuse in wpa2. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, Dallas, Texas, USA, pp 1313–1328
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Chen, S. (2019). Authentication. In: Shen, X., Lin, X., Zhang, K. (eds) Encyclopedia of Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-32903-1_290-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-32903-1_290-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32903-1
Online ISBN: 978-3-319-32903-1
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering