IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference 2008
DOI: 10.1109/glocom.2008.ecp.365
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Authentication Improvement for IEEE 802.11i Specification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…The success of authentication means the wireless device and the access point are identified and verified by each other and a secret key is established for exchanging encrypted data over WLANs. Figure 1 shows that the authentication procedures consists of six phases as follows: a) discover phase, b) authentication and association phase, c) EAP/802.1x/RADIUS authentication, d) 4-way handshake, e) group key handshake, f) secure data communication [9]. The first phase in the IEEE 802.11i standard is the network discovery phase.…”
Section: Overview Of the 80211i Standard Phasesmentioning
confidence: 99%
“…The success of authentication means the wireless device and the access point are identified and verified by each other and a secret key is established for exchanging encrypted data over WLANs. Figure 1 shows that the authentication procedures consists of six phases as follows: a) discover phase, b) authentication and association phase, c) EAP/802.1x/RADIUS authentication, d) 4-way handshake, e) group key handshake, f) secure data communication [9]. The first phase in the IEEE 802.11i standard is the network discovery phase.…”
Section: Overview Of the 80211i Standard Phasesmentioning
confidence: 99%
“…Validation token should be hard to guess for attacker who does not already have access to the user's account. If a request is missing a token or the token does not match the expected value, the web application should reject the request and prompt the user [18].…”
Section: A Secret Validation Tokenmentioning
confidence: 99%
“…This scheme sends additional information with each HTTP request to determine whether the request came from an authorized user. To apply token, web applications must first create a "presession,", and then proceed forward a real session after successful authentication [18]. Validation token should be hard to guess for attacker who does not already have access to the user's account.…”
Section: A Secret Validation Tokenmentioning
confidence: 99%
“…The success of authentication means the wireless device and the access point are identified and verified by each other and a secret key is established for exchanging encrypted data over WLANs. The authentication procedure consists of six phases as follows: a) discover phase, b) authentication and association phase, c) EAP/802.1x/RADIUS authentication, d) 4-way handshake, e) group key handshake, f) secure data communication [8].…”
Section: Ieee80211i Standardmentioning
confidence: 99%