A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN

被引:0
作者
Tran, Bao Ngoc
Nguyen, Thuc Dinh
机构
来源
2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3 | 2008年
关键词
Network security; WLAN security; Authentication protocol; Graph Isomorphism;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on graph isomorphism that can stop man-in-the-middle, session high-jacking and replay attacks. Although authentication protocol based on graph isomorphism was motivated by WLAN (Wireless Local Area Network) security in the infrastructure mode, we believe that it can be modified for the ad-hoc mode where each mobile node holds a partial sub-graph and the nodes can collaborate with each other to authenticate a new node.
引用
收藏
页码:229 / 234
页数:6
相关论文
共 50 条
  • [31] A Novel Integrated Model for Digital Identity Authentication and Access Control
    Sun, Feixian
    Gao, Liping
    [J]. 2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL III, 2011, : 524 - 527
  • [32] Authentication and access control in P2P network
    Zhang, YQ
    Zhang, DH
    [J]. GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 468 - 470
  • [33] New SDN-Oriented Authentication and Access Control Mechanism
    Nife, Fahad
    Kotulski, Zbigniew
    [J]. COMPUTER NETWORKS, CN 2018, 2018, 860 : 74 - 88
  • [34] A Novel Integrated Model for Digital Identity Authentication and Access Control
    Sun, Feixian
    Gao, Liping
    [J]. 2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL II, 2010, : 149 - 152
  • [35] A Double PUF-Based RFID Authentication Protocol
    Li T.
    Liu Y.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1801 - 1810
  • [36] A Secure and Efficient Certificate based Authentication Protocol for Manet
    Verma, Utpal Kumar
    Kumar, Sushil
    Sinha, Ditipriya
    [J]. PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [37] Design of a mutual authentication protocol for RFID based on ECC
    Department of Computer and Information Engineering, Heze University, Heze
    Shandong
    274015, China
    不详
    Shandong
    274015, China
    [J]. Open Autom. Control Syst. J., 1 (1532-1536): : 1532 - 1536
  • [38] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [39] A Cross-domain Authentication protocol Based on Hypercube
    Yao Yao
    Wang Xingwei
    [J]. 2011 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, 2011, : 3528 - 3532
  • [40] A Lightweight Authentication Protocol for UAVs Based on ECC Scheme
    Zhang, Shuo
    Liu, Yaping
    Han, Zhiyu
    Yang, Zhikai
    [J]. DRONES, 2023, 7 (05)