Security analysis and authentication improvement for IEEE 802.11i specification

Xinyu Xing, Elhadi Shakshuki, Darcy Benoit, Tarek Sheltami

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount of research has demonstrated that the IEEE 802.11i specification is sufficient to prevent unauthorized access and use. In this paper, we analyze the IEEE 802.11i wireless networking amendment with respect to data confidentiality, integrity, mutual authentication and availability. Our analysis indicates that a number of serious threats have still not been addressed by the 802.11i amendment. This includes DoS attacks, insider attacks, offline guessing attacks, etc. Furthermore, configuring security features on a commercial Wi-Fi network is moderately-to-very difficult. Towards this end, this paper proposes an improved authentication mechanism which adopts asymmetric cryptography and thus accomplishes link-layer frame protection. Through our further analysis and discussion, we conclude that the proposed mechanism not only prevents potential security threats but also accomplishes autonomic security configuration without human intervention.

Original languageEnglish (US)
Title of host publication2008 IEEE Global Telecommunications Conference, GLOBECOM 2008
Pages1887-1891
Number of pages5
DOIs
StatePublished - Dec 1 2008
Event2008 IEEE Global Telecommunications Conference, GLOBECOM 2008 - New Orleans, LA, United States
Duration: Nov 30 2008Dec 4 2008

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other2008 IEEE Global Telecommunications Conference, GLOBECOM 2008
CountryUnited States
CityNew Orleans, LA
Period11/30/0812/4/08

Fingerprint

Authentication
Specifications
Wi-Fi
Wireless local area networks (WLAN)
Cryptography
Availability
Denial-of-service attack

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

Xing, X., Shakshuki, E., Benoit, D., & Sheltami, T. (2008). Security analysis and authentication improvement for IEEE 802.11i specification. In 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008 (pp. 1887-1891). [4698140] (GLOBECOM - IEEE Global Telecommunications Conference). https://doi.org/10.1109/GLOCOM.2008.ECP.365
Xing, Xinyu ; Shakshuki, Elhadi ; Benoit, Darcy ; Sheltami, Tarek. / Security analysis and authentication improvement for IEEE 802.11i specification. 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. 2008. pp. 1887-1891 (GLOBECOM - IEEE Global Telecommunications Conference).
@inproceedings{27ce61838d99459bb10a0cb5dd6a4639,
title = "Security analysis and authentication improvement for IEEE 802.11i specification",
abstract = "The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount of research has demonstrated that the IEEE 802.11i specification is sufficient to prevent unauthorized access and use. In this paper, we analyze the IEEE 802.11i wireless networking amendment with respect to data confidentiality, integrity, mutual authentication and availability. Our analysis indicates that a number of serious threats have still not been addressed by the 802.11i amendment. This includes DoS attacks, insider attacks, offline guessing attacks, etc. Furthermore, configuring security features on a commercial Wi-Fi network is moderately-to-very difficult. Towards this end, this paper proposes an improved authentication mechanism which adopts asymmetric cryptography and thus accomplishes link-layer frame protection. Through our further analysis and discussion, we conclude that the proposed mechanism not only prevents potential security threats but also accomplishes autonomic security configuration without human intervention.",
author = "Xinyu Xing and Elhadi Shakshuki and Darcy Benoit and Tarek Sheltami",
year = "2008",
month = "12",
day = "1",
doi = "10.1109/GLOCOM.2008.ECP.365",
language = "English (US)",
isbn = "9781424423248",
series = "GLOBECOM - IEEE Global Telecommunications Conference",
pages = "1887--1891",
booktitle = "2008 IEEE Global Telecommunications Conference, GLOBECOM 2008",

}

Xing, X, Shakshuki, E, Benoit, D & Sheltami, T 2008, Security analysis and authentication improvement for IEEE 802.11i specification. in 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008., 4698140, GLOBECOM - IEEE Global Telecommunications Conference, pp. 1887-1891, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008, New Orleans, LA, United States, 11/30/08. https://doi.org/10.1109/GLOCOM.2008.ECP.365

Security analysis and authentication improvement for IEEE 802.11i specification. / Xing, Xinyu; Shakshuki, Elhadi; Benoit, Darcy; Sheltami, Tarek.

2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. 2008. p. 1887-1891 4698140 (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Security analysis and authentication improvement for IEEE 802.11i specification

AU - Xing, Xinyu

AU - Shakshuki, Elhadi

AU - Benoit, Darcy

AU - Sheltami, Tarek

PY - 2008/12/1

Y1 - 2008/12/1

N2 - The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount of research has demonstrated that the IEEE 802.11i specification is sufficient to prevent unauthorized access and use. In this paper, we analyze the IEEE 802.11i wireless networking amendment with respect to data confidentiality, integrity, mutual authentication and availability. Our analysis indicates that a number of serious threats have still not been addressed by the 802.11i amendment. This includes DoS attacks, insider attacks, offline guessing attacks, etc. Furthermore, configuring security features on a commercial Wi-Fi network is moderately-to-very difficult. Towards this end, this paper proposes an improved authentication mechanism which adopts asymmetric cryptography and thus accomplishes link-layer frame protection. Through our further analysis and discussion, we conclude that the proposed mechanism not only prevents potential security threats but also accomplishes autonomic security configuration without human intervention.

AB - The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount of research has demonstrated that the IEEE 802.11i specification is sufficient to prevent unauthorized access and use. In this paper, we analyze the IEEE 802.11i wireless networking amendment with respect to data confidentiality, integrity, mutual authentication and availability. Our analysis indicates that a number of serious threats have still not been addressed by the 802.11i amendment. This includes DoS attacks, insider attacks, offline guessing attacks, etc. Furthermore, configuring security features on a commercial Wi-Fi network is moderately-to-very difficult. Towards this end, this paper proposes an improved authentication mechanism which adopts asymmetric cryptography and thus accomplishes link-layer frame protection. Through our further analysis and discussion, we conclude that the proposed mechanism not only prevents potential security threats but also accomplishes autonomic security configuration without human intervention.

UR - http://www.scopus.com/inward/record.url?scp=67249125069&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=67249125069&partnerID=8YFLogxK

U2 - 10.1109/GLOCOM.2008.ECP.365

DO - 10.1109/GLOCOM.2008.ECP.365

M3 - Conference contribution

AN - SCOPUS:67249125069

SN - 9781424423248

T3 - GLOBECOM - IEEE Global Telecommunications Conference

SP - 1887

EP - 1891

BT - 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008

ER -

Xing X, Shakshuki E, Benoit D, Sheltami T. Security analysis and authentication improvement for IEEE 802.11i specification. In 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. 2008. p. 1887-1891. 4698140. (GLOBECOM - IEEE Global Telecommunications Conference). https://doi.org/10.1109/GLOCOM.2008.ECP.365