A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN

被引:0
|
作者
Tran, Bao Ngoc
Nguyen, Thuc Dinh
机构
来源
2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3 | 2008年
关键词
Network security; WLAN security; Authentication protocol; Graph Isomorphism;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on graph isomorphism that can stop man-in-the-middle, session high-jacking and replay attacks. Although authentication protocol based on graph isomorphism was motivated by WLAN (Wireless Local Area Network) security in the infrastructure mode, we believe that it can be modified for the ad-hoc mode where each mobile node holds a partial sub-graph and the nodes can collaborate with each other to authenticate a new node.
引用
收藏
页码:229 / 234
页数:6
相关论文
共 50 条
  • [1] A password based authentication protocol for access control in WLAN
    Liu, JX
    Tang, BH
    Liu, Y
    Liu, C
    Liu, YA
    International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 1099 - 1102
  • [2] An Efficient WLAN Initial Access Authentication Protocol
    Li, Xinghua
    Ma, Jianfeng
    Shen Yulong
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1035 - 1040
  • [3] A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
    Jiang, Xin
    Liu, Mingzhe
    Yang, Chen
    Liu, Yanhua
    Wane, Ruili
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (01): : 45 - 59
  • [4] FLAP: An Efficient WLAN Initial Access Authentication Protocol
    Li, Xinghua
    Bao, Fenye
    Li, Shuxin
    Ma, Jianfeng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 488 - 497
  • [5] Blockchain based authentication and access control protocol for IoT
    Akanksha Singh
    Harish Chandra
    Saurabh Rana
    Deepak Chhikara
    Multimedia Tools and Applications, 2024, 83 : 51731 - 51753
  • [6] Blockchain based authentication and access control protocol for IoT
    Singh, Akanksha
    Chandra, Harish
    Rana, Saurabh
    Chhikara, Deepak
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (17) : 51731 - 51753
  • [7] Introduction and Analysis of an Authentication protocol Based on WLAN
    li, Li
    Yong, Guo
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 8, 2009, : 126 - 130
  • [8] An Elliptic Curve Based Handoff Authentication Protocol for WLAN
    Wan Changsheng
    Hu Aiqun
    Zhang Juan
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (01): : 165 - 169
  • [9] An Authentication Protocol based on EAP-PAX for WLAN
    Wang Bin
    He Lei
    Wu Zhi-hui
    2011 INTERNATIONAL CONFERENCE ON FUTURE SOFTWARE ENGINEERING AND MULTIMEDIA ENGINEERING (FSME 2011), 2011, 7 : 164 - +
  • [10] An Authentication Protocol Based on EAP-EKE for WLAN
    Wang Bin
    He Lei
    Wu Zhi-hui
    2011 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (ICFIE 2011), 2011, 8 : 10 - 13