A Security Authentication Scheme in Wireless LAN for Portable Terminal

Article Preview

Abstract:

The portable terminal such as iPad, WIFI phone has limited computing power and transmission bandwidth compared with specialized computer, which is difficult to implement key cryptography algorithm with large amount of calculation question. This paper introduces a new EAP authentication method based on EAP-SAKE using hash function. Analysis result shows that the method can provide mutual authentication and key negotiation between peers,and can resist replay attack and man-in-middle attack.It has less communication load and computing amount, so it is more suitable for protecting the information security to portable mobile terminal which has limited resource in WLAN.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

637-640

Citation:

Online since:

February 2014

Authors:

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Y. Ohba, Q. Wu and G. Zorn: IETF Internet Draft. (2009).

Google Scholar

[2] F.Q. Chen, G. Yao: Computer Systems & Applications. Vol. 19 (2010), p.74.

Google Scholar

[3] M. Vanderveen, H. Soliman: Extensible Authentication Protocol Method for Shared Secret EAP-SAKE Authentication and Key Establishment (EAP-SAKE), RFC 4763, IETF, June (2006).

DOI: 10.17487/rfc4763

Google Scholar

[4] J.W. Zhang, L. He: Computer Engineering and Applications. Vol. 44 (2008), p.97.

Google Scholar

[5] B. Wang, X.M. Lv: Journal of Zhengzhou University of Light Industry (Natural Science). Vol. 26 (2011), p.50.

Google Scholar