A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN

被引:0
作者
Tran, Bao Ngoc
Nguyen, Thuc Dinh
机构
来源
2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3 | 2008年
关键词
Network security; WLAN security; Authentication protocol; Graph Isomorphism;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on graph isomorphism that can stop man-in-the-middle, session high-jacking and replay attacks. Although authentication protocol based on graph isomorphism was motivated by WLAN (Wireless Local Area Network) security in the infrastructure mode, we believe that it can be modified for the ad-hoc mode where each mobile node holds a partial sub-graph and the nodes can collaborate with each other to authenticate a new node.
引用
收藏
页码:229 / 234
页数:6
相关论文
共 50 条
  • [21] Provably secure certificateless trusted access protocol for WLAN without pairing
    Ma, Zhuo
    Zhang, Junwei
    Ma, Jianfeng
    Ji, Wenjiang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (02): : 325 - 333
  • [22] An Algorithm for Testing Isomorphism of Planer Graph Based on Distant Matrix
    Wu, Yanpeng
    Liu, Shuiqiang
    EMERGING MATERIALS AND MECHANICS APPLICATIONS, 2012, 487 : 317 - 321
  • [23] A Secure Scalable Authentication Protocol for Access Network Communications using ECC
    Patel, Suyash
    Dua, Amit
    Kumar, Neeraj
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [24] Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol
    Chen, Chien-Ming
    Fang, Weicheng
    Liu, Shuai
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    Wang, King-Hang
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (02) : 371 - 390
  • [25] Openstack authentication protocol based on digital certificate
    Zhu Z.
    Lin R.
    Hu C.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (02): : 188 - 196
  • [26] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [27] A Novel RFID Authentication Protocol Based on NTRU
    Shi, Zhicai
    Zhou, Jinzu
    Xia, Yongxiang
    Yu, Chaogang
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 16 - 20
  • [28] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [29] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [30] Authenticating Grid Using Graph Isomorphism Based Zero Knowledge Proof
    Gebeyehu, Worku B.
    Ambaw, Lubak M.
    Reddy, M. A. Eswar
    Avadhani, P. S.
    ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 11 - 19