2016
DOI: 10.1007/s40010-015-0241-1
|View full text |Cite
|
Sign up to set email alerts
|

A System and Method for Authentication in Wireless Local Area Networks (WLANs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…Amit et al [11] proposed a technique that claims to relieve server's burden while also meeting all security requirements. An authentication protocol was proposed by Pandey et al [10]. The fast reconnect mechanism and key generation aren't specified in their protocol.…”
Section: B Eap Protocols Based On Strong Passwordsmentioning
confidence: 99%
See 2 more Smart Citations
“…Amit et al [11] proposed a technique that claims to relieve server's burden while also meeting all security requirements. An authentication protocol was proposed by Pandey et al [10]. The fast reconnect mechanism and key generation aren't specified in their protocol.…”
Section: B Eap Protocols Based On Strong Passwordsmentioning
confidence: 99%
“…• Ephemeral secret leakage: The authentication protocols [3], [10], [11], [13] do not provide protection from ephemeral secret leakage. • Fast-reconnect: Majority of the authentication protocol do not support [9], [10], [12]- [14], [19], [22] fast reconnect for quick re-authentication.…”
Section: Research Gaps In the Existing Authentication Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…1) Lack of identity protection: The identities of the STA and S must always be exchanged in masked form, according to identity protection. The majority of the EAP based authentication protocols [9], [10], [12], [13], [18] do not provide the identity protection. 2) Lack of protection from privileged insider attack: It requires that STA must keep secret credentials in disguised form in the database so that no insider may pry into the information.…”
Section: A Research Gapsmentioning
confidence: 99%
“…3) Perfect forward secrecy: Even if long-term credentials are compromised, obtaining the previous session key should not be possible. Majority of the authentication protocols [9], [10], [12], [13], [18] fail to preserve the perfect forward secrecy. 4) Cost: It is seen that strong password-based EAP protocols fail to address the security requirements like replay attack protection, privileged insider attack protection, identity protection, and perfect forward secrecy, while the certificate-based authentication protocols require high cost and delay.…”
Section: A Research Gapsmentioning
confidence: 99%