Security analysis and authentication improvement for IEEE 802.11i specification

Xinyu Xing, Elhadi Shakshuki, Darcy Benoit, Tarek Sheltami

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount of research has demonstrated that the IEEE 802.11i specification is sufficient to prevent unauthorized access and use. In this paper, we analyze the IEEE 802.11i wireless networking amendment with respect to data confidentiality, integrity, mutual authentication and availability. Our analysis indicates that a number of serious threats have still not been addressed by the 802.11i amendment. This includes DoS attacks, insider attacks, offline guessing attacks, etc. Furthermore, configuring security features on a commercial Wi-Fi network is moderately-to-very difficult. Towards this end, this paper proposes an improved authentication mechanism which adopts asymmetric cryptography and thus accomplishes link-layer frame protection. Through our further analysis and discussion, we conclude that the proposed mechanism not only prevents potential security threats but also accomplishes autonomic security configuration without human intervention.

Original languageEnglish (US)
Title of host publication2008 IEEE Global Telecommunications Conference, GLOBECOM 2008
Pages1887-1891
Number of pages5
DOIs
StatePublished - Dec 1 2008
Event2008 IEEE Global Telecommunications Conference, GLOBECOM 2008 - New Orleans, LA, United States
Duration: Nov 30 2008Dec 4 2008

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other2008 IEEE Global Telecommunications Conference, GLOBECOM 2008
CountryUnited States
CityNew Orleans, LA
Period11/30/0812/4/08

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Security analysis and authentication improvement for IEEE 802.11i specification'. Together they form a unique fingerprint.

  • Cite this

    Xing, X., Shakshuki, E., Benoit, D., & Sheltami, T. (2008). Security analysis and authentication improvement for IEEE 802.11i specification. In 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008 (pp. 1887-1891). [4698140] (GLOBECOM - IEEE Global Telecommunications Conference). https://doi.org/10.1109/GLOCOM.2008.ECP.365