Explore chapters and articles related to this topic
Tunable Security Services for Wireless Networks
Published in Mohamed Ibnkahla, Adaptation and Cross Layer Design in Wireless Networks, 2018
Stefan Lindskog, Anna Brunstrom, Zolán Faigl
The next presented tunable security service was presented in [28] and is based on the IEEE 802.11i standard [16] using open system authentication. This means that the Extensible Authentication Protocol (EAP) [1] is used for network access control. When EAP is the chosen protocol, an authentication method must be selected. Some examples of common EAP methods are: EAP-MD5,* EAP-TLS, EAP-TTLS,† and PEAP.‡ The assumption in this tunable security service is that EAP-TLS is used. This implies that TLS is used on top of EAP. With EAP-TLS a mutual authentication process can be performed before a station is allowed access to the wireless local area network (WLAN). The tunable service illustrates how latency can be traded against the strength of the authentication process in this context.
Wireless Security Wi-Fi
Published in Ali Youssef, Douglas McDonald II, Jon Linton, Bob Zemke, Aaron Earle, Wi-Fi Enabled Healthcare, 2014
Ali Youssef, Douglas McDonald II, Jon Linton, Bob Zemke, Aaron Earle
Extensible Authentication Protocol (EAP) is a standard method of performing authentication to gain access to a network. When Password Authentication Protocol (PAP) first came out, security issues quickly made it a less than desirable authentication method. After that Challenge Handshake Authentication Protocol (CHAP) came out and this also quickly became plagued with security issues. thhe industry decided it was easier to make an authentication protocol act the same way no matter how or what type of authentication validation took place. This meant for the first time a protocol could be inserted into products and software that allowed for passwords, tokens, or biometrics without having to write any extra code to support the different methods. This is how and why EAP was created. To use EAP you must specify inside the type field what kind of authentication you are going to use. This allows EAP to be used for passwords, tokens, and other authentication types. The EAP protocol can adapt to security issues and changes by leveraging different methods of authentication. EAP is also able to address new and always improving authentication techniques without having to make any changes to EAP supporting equipment.
Authentication in Wireless Networks
Published in Yang Xiao, Security in Distributed, Grid, Mobile, and Pervasive Computing, 2007
Saikat Chakrabarti, Venkata C. Giruka, Mukesh Singhal
Asymmetric Approach: The client and the AS authenticate each other using the public-key cryptography The realm of public-key cryptography demands the necessity of providing an assurance to users regarding the binding of a public key to the identity of the user who holds the corresponding private key The deployment and management of the underlying infrastructure is quintessential to providing such an assurance. Certificates play the role of providing such authenticity in traditional public-key infrastructures. The advent of identity-based public-key cryptosystems has made it possible to do away with the burden of certificate management and yet provide implicit authentication to users [2]. Shamir [25] first proposed the concept of an identity-based cryptosystem where the public key of a user could be generated from his identity information. A trusted third party called the Key Generation Center (KGC) was required to derive the private keys corresponding to the public keys of users. The KGC would also publish the public global system parameters needed for encryption, decryption, and signature algorithms that users need to execute. The use of bilinear pairings on elliptic curves has served as an exciting breakthrough in building various kinds of cryptographic schemes [13]. The EAP over Transport Layer Security (EAP-TLS) protocol [9] uses certificate-based authentication. Lee et al. [7] used the identity-based cryptosystem to build an EAP authentication protocol.
Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges
Published in Enterprise Information Systems, 2021
Subodh Mendhurwar, Rajhans Mishra
Roman, Zhou and Lopez (2013) have outlined various types of IoT architectures like Centralised IoT, Collaborative IoT, Connected Intranets of Things and Distributed IoT. Recommended Security Architecture of IoT Application and Middleware Layer includes – Federated Identity Management, Encryption Mechanisms, Firewalls, Risk Assessment and Intrusion Detection (Farooq et al. 2015). Heer et al. (2011) while weighing the pros and cons of centralised versus distributed IoT architectures, discussed suitability of protocols like – Internet Key Exchange (IKEv2)/IPsec, Host Identity Protocol (HIP), Datagram-oriented Transport Layer Security (DTLS), Extensible Authentication Protocol (EAP), Protocol for Carrying Authentication for Network Access (PANA) as candidate solutions for 6LoWPAN; observing that since resource constraints hinder securing each individual OSI layer, cross-layer concepts should be considered for an IoT-driven redesign of Internet security protocols.
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks
Published in Connection Science, 2022
Daniel Gerbi Duguma, Jiyoon Kim, Sangmin Lee, Nam-Su Jho, Vishal Sharma, Ilsun You
5G-AKA (5G Authentication and Key Agreement) or EAP-AKA’ (Extensible Authentication Protocol) serve as the preferred primary authentication in 5G. The procedure involves different virtual network functions, residing in both serving and home networks, like Access and Mobility Management Function (AMF), Security Anchor Function (SEAF), Authentication Server Function (AUSF), Unified Data Management (UDM), Authentication Credential Repository and Processing Function (ARPF), and Subscription Identifier De-Concealing Function (SIDF).