Access control protocols with two-layer architecture for wireless networks
In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the sec...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2007
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1246 http://dx.doi.org/10.1016/j.comnet.2006.05.009 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2245 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-22452011-01-05T08:35:06Z Access control protocols with two-layer architecture for wireless networks WAN, Zhiguo DENG, Robert H. Bao, Feng Ananda, A. L. In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the second protocol, referred to as the Stanford protocol, uses public key cryptosystems (PKC) for authentication and performs access control at the link layer. Although both protocols are intended to restrict access to wireless networks only to authorized users, our analysis shows that both protocols have serious security flaws which make them vulnerable to attacks. Then we propose a password-based protocol and a PKC-based protocol for the Lancaster architecture and the Stanford architecture, respectively. Both of our protocols provide mutual authentication, perfect forward secrecy and access control for wireless networks. Moreover, they also provide DoS resistance and identity confidentiality for the client. We present detailed security and performance analysis for our protocols, and show that both of our protocols are secure and efficient for access control in wireless networks. 2007-02-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/1246 info:doi/10.1016/j.comnet.2006.05.009 http://dx.doi.org/10.1016/j.comnet.2006.05.009 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Information Security |
spellingShingle |
Information Security WAN, Zhiguo DENG, Robert H. Bao, Feng Ananda, A. L. Access control protocols with two-layer architecture for wireless networks |
description |
In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the second protocol, referred to as the Stanford protocol, uses public key cryptosystems (PKC) for authentication and performs access control at the link layer. Although both protocols are intended to restrict access to wireless networks only to authorized users, our analysis shows that both protocols have serious security flaws which make them vulnerable to attacks. Then we propose a password-based protocol and a PKC-based protocol for the Lancaster architecture and the Stanford architecture, respectively. Both of our protocols provide mutual authentication, perfect forward secrecy and access control for wireless networks. Moreover, they also provide DoS resistance and identity confidentiality for the client. We present detailed security and performance analysis for our protocols, and show that both of our protocols are secure and efficient for access control in wireless networks. |
format |
text |
author |
WAN, Zhiguo DENG, Robert H. Bao, Feng Ananda, A. L. |
author_facet |
WAN, Zhiguo DENG, Robert H. Bao, Feng Ananda, A. L. |
author_sort |
WAN, Zhiguo |
title |
Access control protocols with two-layer architecture for wireless networks |
title_short |
Access control protocols with two-layer architecture for wireless networks |
title_full |
Access control protocols with two-layer architecture for wireless networks |
title_fullStr |
Access control protocols with two-layer architecture for wireless networks |
title_full_unstemmed |
Access control protocols with two-layer architecture for wireless networks |
title_sort |
access control protocols with two-layer architecture for wireless networks |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2007 |
url |
https://ink.library.smu.edu.sg/sis_research/1246 http://dx.doi.org/10.1016/j.comnet.2006.05.009 |
_version_ |
1770570909457842176 |