A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN

被引:0
作者
Tran, Bao Ngoc
Nguyen, Thuc Dinh
机构
来源
2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3 | 2008年
关键词
Network security; WLAN security; Authentication protocol; Graph Isomorphism;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on graph isomorphism that can stop man-in-the-middle, session high-jacking and replay attacks. Although authentication protocol based on graph isomorphism was motivated by WLAN (Wireless Local Area Network) security in the infrastructure mode, we believe that it can be modified for the ad-hoc mode where each mobile node holds a partial sub-graph and the nodes can collaborate with each other to authenticate a new node.
引用
收藏
页码:229 / 234
页数:6
相关论文
共 50 条
[41]   Enhanced Delegation-Based Authentication Protocol for PCSs [J].
Lee, Tian-Fu ;
Chang, Shu-Hui ;
Hwang, Tzonelih ;
Chong, Song-Kong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) :2166-2171
[42]   Security authentication protocol for WiMAX wireless network based on protocol composition logic [J].
Feng T. ;
Zhang Z.-B. ;
Ma J.-F. .
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (09) :2106-2111
[43]   A Lightweight Authentication Protocol for IoT-Based Applications Using Reconfigurable Noisy PUFs [J].
Modarres, Amir Masoud Aminian ;
Sarbishaei, Ghazaleh .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (09) :11384-11392
[44]   An access control protocol for IoT-based critical infrastructure in smart grid environment [J].
Badar, Hafiz Muhammad Sanaullah ;
Obaidat, Mohammad S. ;
Mahmood, Khalid ;
Saher, Najia ;
Ayub, Muhammad Faizan ;
Khan, Dost Muhammad .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (08)
[45]   An Efficient Graph Isomorphism Algorithm Based on Canonical Labeling and Its Parallel Implementation on GPU [J].
Wang, Renda ;
Guo, Longjiang ;
Ai, Chunyu ;
Li, Jinbao ;
Ren, Meirui ;
Li, Keqin .
2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, :1089-1096
[46]   An efficient heuristic approach to detecting graph isomorphism based on combinations of highly discriminating invariants [J].
Dehmer, Matthias ;
Grabner, Martin ;
Mowshowitz, Abbe ;
Emmert-Streib, Frank .
ADVANCES IN COMPUTATIONAL MATHEMATICS, 2013, 39 (02) :311-325
[47]   MapEff: An Effective Graph Isomorphism Agorithm Based on the Discrete-Time Quantum Walk [J].
Liu, Kai ;
Zhang, Yi ;
Lu, Kai ;
Wang, Xiaoping ;
Wang, Xin ;
Tian, Guojing .
ENTROPY, 2019, 21 (06)
[48]   Graph isomorphism-based algorithm for cross-checking chemical and crystallographic descriptions [J].
Merkys, Andrius ;
Vaitkus, Antanas ;
Grybauskas, Algirdas ;
Konovalovas, Aleksandras ;
Quiros, Miguel ;
Grazulis, Saulius .
JOURNAL OF CHEMINFORMATICS, 2023, 15 (01)
[49]   An efficient heuristic approach to detecting graph isomorphism based on combinations of highly discriminating invariants [J].
Matthias Dehmer ;
Martin Grabner ;
Abbe Mowshowitz ;
Frank Emmert-Streib .
Advances in Computational Mathematics, 2013, 39 :311-325
[50]   A Robust Access Control Protocol for the Smart Grid Systems [J].
Tanveer, Muhammad ;
Khan, Abd Ullah ;
Kumar, Neeraj ;
Naushad, Alamgir ;
Chaudhry, Shehzad Ashraf .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (09) :6855-6865