A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN

被引:0
作者
Tran, Bao Ngoc
Nguyen, Thuc Dinh
机构
来源
2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3 | 2008年
关键词
Network security; WLAN security; Authentication protocol; Graph Isomorphism;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on graph isomorphism that can stop man-in-the-middle, session high-jacking and replay attacks. Although authentication protocol based on graph isomorphism was motivated by WLAN (Wireless Local Area Network) security in the infrastructure mode, we believe that it can be modified for the ad-hoc mode where each mobile node holds a partial sub-graph and the nodes can collaborate with each other to authenticate a new node.
引用
收藏
页码:229 / 234
页数:6
相关论文
共 50 条
[21]   Provably secure certificateless trusted access protocol for WLAN without pairing [J].
Ma, Zhuo ;
Zhang, Junwei ;
Ma, Jianfeng ;
Ji, Wenjiang .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (02) :325-333
[22]   An Algorithm for Testing Isomorphism of Planer Graph Based on Distant Matrix [J].
Wu, Yanpeng ;
Liu, Shuiqiang .
EMERGING MATERIALS AND MECHANICS APPLICATIONS, 2012, 487 :317-321
[23]   A Secure Scalable Authentication Protocol for Access Network Communications using ECC [J].
Patel, Suyash ;
Dua, Amit ;
Kumar, Neeraj .
2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
[24]   Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol [J].
Chen, Chien-Ming ;
Fang, Weicheng ;
Liu, Shuai ;
Wu, Tsu-Yang ;
Pan, Jeng-Shyang ;
Wang, King-Hang .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (02) :371-390
[25]   On the Security of an ECC Based RFID Authentication Protocol [J].
Babaheidarian, Parisa ;
Delavar, Mahshid ;
Mohajeri, Javad .
2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, :111-114
[26]   Authentication protocol based on elliptic curve cryptography [J].
Constantinescu, Nicolae .
ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02) :83-91
[27]   A Novel RFID Authentication Protocol Based on NTRU [J].
Shi, Zhicai ;
Zhou, Jinzu ;
Xia, Yongxiang ;
Yu, Chaogang .
INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 :16-20
[28]   ECC-Based RFID Authentication Protocol [J].
Yang X.-C. ;
Xu C.-X. ;
Li C.-R. .
Journal of Electronic Science and Technology, 2020, 18 (04) :320-329
[29]   Openstack authentication protocol based on digital certificate [J].
Zhu Z. ;
Lin R. ;
Hu C. .
Tongxin Xuebao/Journal on Communications, 2019, 40 (02) :188-196
[30]   Authenticating Grid Using Graph Isomorphism Based Zero Knowledge Proof [J].
Gebeyehu, Worku B. ;
Ambaw, Lubak M. ;
Reddy, M. A. Eswar ;
Avadhani, P. S. .
ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 :11-19