WLAN Authentication Scheme Based on Message-Recovery RSA-PSS

Article Preview

Abstract:

In this paper, a wireless local area network (WLAN) authentication scheme is proposed to both enhance the security and the working efficiency of the network. The authentication sever (AS) and the mobile terminals are properly configured with different workloads of signature generations and signature verifications. We propose using the RSA-PSS-MR scheme and the improved ElGamal scheme. Firstly, the Recovery features of the RSA-PSS-MR scheme have reduced the communication bandwidth sharply since the public keys are not necessary to transmit in our scheme. Secondly, the asymmetry calculation of signature generations and verifications of the improved ElGamal scheme can be well used to configure the scheme. The proposed scheme resolves the real-time transmission problem of authentication.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 546-547)

Pages:

1113-1118

Citation:

Online since:

July 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] The LAN/MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control and physical layer specification[S]. IEEE std802. 11-(1997).

Google Scholar

[2] M. Chiba, D. Dommety, M. Eklund, et al. Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS) [S], Request for Comments: 5176, Network Working Group, (2008).

DOI: 10.17487/rfc5176

Google Scholar

[3] B. Sterman, D. Sadolevsky, D. Schwartz, et al. "RADIUS Extension for Digest Authentication.

DOI: 10.17487/rfc4590

Google Scholar

[4] M. J. Sharma, V.C.M. Leung. Improved IP Multimedia Subsystem Authentication mechanism for 3G-WLAN networks[C], 2011 IEEE Conference on Computer Communications Workshops, 2011, p.1000 – 1005.

DOI: 10.1109/infcomw.2011.5928773

Google Scholar

[5] R. Hyosun, J. Souhwan. Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks[C], Conference on Information and Communication Technology Convergence. 2010, p.482 – 483.

DOI: 10.1109/ictc.2010.5674797

Google Scholar

[6] M. Bellare, P. Rogaway. Optional asymmetric encryption[C], Advances in Cryptology—Proc- eedings of EUROCRYPT, LNCS 950, pp.92-111 . Springer-Verlag, (1994).

DOI: 10.1007/bfb0053428

Google Scholar

[7] L. Harn, Y. Xu. Design of generalised ElGamal type digital signature schemes based on discrete logarithm[J], IEE Electronics letters, 1994, 30 (24), p.2025 – (2026).

DOI: 10.1049/el:19941398

Google Scholar

[8] M. Bellare, P. Rogaway. The Exact Security of Digital Signatures—How to Sign with RSA and Rabin[C], Advances in Cryptology—Proceedings of EUROCRYPT, LNCS 1070, p.399 – 416, Springer-Verlag , (1996).

DOI: 10.1007/3-540-68339-9_34

Google Scholar

[9] The LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Std802. 1X-2001, IEEE Standard for Local and Metropolitan area networks—Prot-Based Network Access Control[S]. IEEE New York, June (2001).

DOI: 10.1109/ieeestd.2004.96095

Google Scholar

[10] National Password Management Office.SMS4 Cipher Algorithm Using by WLAN products. Information on http: /www. oscca. govcn/Doc/6 /News_1106. htm. (2006).

Google Scholar

[11] Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms[J], IEEE Trans. Info. Theory, IT-31(4), p.469 – 472, (1985).

DOI: 10.1109/tit.1985.1057074

Google Scholar

[12] J. Alfred, C. Menezes, C. Paul, et al. Handbook of Applied Cryptography[M], CRC Press: Boca Raton, 1996, p.617 – 619.

Google Scholar

[13] J. Liu, F. Xie, S. Du, A. Zhao. Security proof of public-key encryption algorithm Rabin-OAEP[J], Computer Engineering, 2009, 35(16), p.115 – 116.

Google Scholar