Access control protocols with two-layer architecture for wireless networks

In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the sec...

Full description

Saved in:
Bibliographic Details
Main Authors: WAN, Zhiguo, DENG, Robert H., Bao, Feng, Ananda, A. L.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2007
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1246
http://dx.doi.org/10.1016/j.comnet.2006.05.009
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2245
record_format dspace
spelling sg-smu-ink.sis_research-22452011-01-05T08:35:06Z Access control protocols with two-layer architecture for wireless networks WAN, Zhiguo DENG, Robert H. Bao, Feng Ananda, A. L. In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the second protocol, referred to as the Stanford protocol, uses public key cryptosystems (PKC) for authentication and performs access control at the link layer. Although both protocols are intended to restrict access to wireless networks only to authorized users, our analysis shows that both protocols have serious security flaws which make them vulnerable to attacks. Then we propose a password-based protocol and a PKC-based protocol for the Lancaster architecture and the Stanford architecture, respectively. Both of our protocols provide mutual authentication, perfect forward secrecy and access control for wireless networks. Moreover, they also provide DoS resistance and identity confidentiality for the client. We present detailed security and performance analysis for our protocols, and show that both of our protocols are secure and efficient for access control in wireless networks. 2007-02-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/1246 info:doi/10.1016/j.comnet.2006.05.009 http://dx.doi.org/10.1016/j.comnet.2006.05.009 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
WAN, Zhiguo
DENG, Robert H.
Bao, Feng
Ananda, A. L.
Access control protocols with two-layer architecture for wireless networks
description In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the second protocol, referred to as the Stanford protocol, uses public key cryptosystems (PKC) for authentication and performs access control at the link layer. Although both protocols are intended to restrict access to wireless networks only to authorized users, our analysis shows that both protocols have serious security flaws which make them vulnerable to attacks. Then we propose a password-based protocol and a PKC-based protocol for the Lancaster architecture and the Stanford architecture, respectively. Both of our protocols provide mutual authentication, perfect forward secrecy and access control for wireless networks. Moreover, they also provide DoS resistance and identity confidentiality for the client. We present detailed security and performance analysis for our protocols, and show that both of our protocols are secure and efficient for access control in wireless networks.
format text
author WAN, Zhiguo
DENG, Robert H.
Bao, Feng
Ananda, A. L.
author_facet WAN, Zhiguo
DENG, Robert H.
Bao, Feng
Ananda, A. L.
author_sort WAN, Zhiguo
title Access control protocols with two-layer architecture for wireless networks
title_short Access control protocols with two-layer architecture for wireless networks
title_full Access control protocols with two-layer architecture for wireless networks
title_fullStr Access control protocols with two-layer architecture for wireless networks
title_full_unstemmed Access control protocols with two-layer architecture for wireless networks
title_sort access control protocols with two-layer architecture for wireless networks
publisher Institutional Knowledge at Singapore Management University
publishDate 2007
url https://ink.library.smu.edu.sg/sis_research/1246
http://dx.doi.org/10.1016/j.comnet.2006.05.009
_version_ 1770570909457842176