Abstract
Authentication has strong impact on the overall security model of every information system. Various authentication techniques are available for restricting the access of unauthorized users to the enterprise scale networks. IEEE 802.1X defines a secure and reliable authentication framework for 802.11 WLANs, where Extensible Authentication Protocol (EAP) provides the base to this architecture. EAP is a generic architectural framework which supports extensibility by incorporating the new and improved authentication schemes, which are based on different types of credentials. Currently there exist a number of EAP and Non-EAP methods with varying level of security and complexity. In this work, we have designed a new n-secret based authentication scheme referred here as Personal Dialogue Based Authentication, for the client authentication to the network. It is a Transport Layer Security (TLS) protected authentication protocol, which will be executed inside the secure TLS tunnel for providing the privacy and credential security to the wireless client. The developed authentication protocol has a reasonable set of features like; strong security, user privacy, simplicity and extensibility. For the formal analysis of the protocol we have used SPAN–AVISAP model checker on Ubuntu platform for validating the realization of the specified security goals. The experimental results obtained by simulation performed with the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows that our protocol is efficient and secured.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Peisert, S., Talbot, E., & Kroeger, T. (2013). Principles of authentication. In New security paradigms (pp. 47–56). London: ACM.
Aldwairi, M., & Aldhanhani, S. (2017). Multi-factor authentication system. In International conference on research and innovation in computer engineering and computer sciences. Malaysia: MTSA.
Ajah, I. A. (2014). Evaluation of enhanced security solutions in 802.11-based networks. International Journal of Network Security and Its Applications, 6(4), 29–42.
Geier, J. (2008). Implementing 802.1 X security solutions for wired and wireless networks. New York: Wiley.
Idrissi, Y. E. H. E., Zahid, N., & Jedra, M. (2011). A new EAP authentication method for IEEE 802.11 wireless. International Journal of Computer Science and Network Security, 11(6), 1–11.
Kbar, G. (2010). Wireless network token-based fast authentication. IN International conference on telecommunications (pp. 227–233). Qatar: IEEE.
Jindal, P., & Singh, B. (2013). Fast and secure authentication using double token based scheme for WLANs. International Journal of Computer Applications, 62(8), 25–32.
Alezabi, K. A., Hashim, F., Hashim, S. J., & Ali, B. M. (2013). A new tunnelled EAP based authentication method for WiMAX networks. InInternational conference on communications (pp. 412–417). Malaysia: IEEE.
Eshmurzaev, B., & Dalkilic, G. (2012). Analysis of EAP-FAST protocol. In International conference on information technology interfaces (pp. 417–422). Croatia: IEEE.
Vighnesh, N. V., Kavita, N., Shalini, R. U., & Sampalli, S. (2011). A novel sender authentication scheme based on hash chain for vehicular ad-hoc networks. In Symposium on wireless technology and applications (pp. 96–101). Malaysia: IEEE.
Li, X., Bao, F., Li, S., & Ma, J. (2013). FLAP: an efficient WLAN initial access authentication protocol. IEEE Transactions on Parallel and Distributed Systems, 25(2), 488–497.
Hong-tao, G. (2015). Fast authentication method for wireless local area network. International Journal of Security and Its Applications, 9(6), 53–60.
Fan, C., Lin, Y. H., & Hsu, R. H. (2012). Complete EAP method: User efficient and forward secure authentication protocol for IEEE 802.11 wireless LANs. IEEE Transactions on Parallel and Distributed Systems, 24(4), 672–680.
Newman, L. H. (2017). The secure Wi-Fi standard has a huge dangerous flaw. Resource Document. Wired. Retrieved March 25, 2020 from https://www.wired.com/story/krack-wi-fi-wpa2-vulnerability.
Alliance, Wi-Fi. (2019). Discover Wi-Fi security. Resource Document. Retrieved March 29, 2020, from https://www.wi-fi.org/discover-wi-fi/security.
TSA Division, TEC (2018). WLAN (Wireless Local Area Network) Security. Resource Document. Retrieved March 29, 2020, from http://tec.gov.in/pdf/Studypaper/WLANsecuritystudypaper.pdf.
Shojaie, B., Saberi, I., & Salleh, M. (2017). Enhancing EAP-TLS authentication protocol for IEEE 802.11i. Wireless Networks, 23(5), 1491–1508.
Dejamfar, S. M., & Najafzadeh, S. (2017). Enhancing efficiency of EAP-TTLS protocol through the simultaneous use of encryption and digital signature algorithm. International Journal of Network Security & Its Applications, 9(4), 45–55.
Bahrami, N., Shiri, M. E., & Akhgar, M. S. (2013). Enhanced authentication protocol EAP-TTLS using encrypted ECDSA. International Journal of Computer Science Issues, 10(6), 173–177.
Hoeper, K., & Chen, L. (2010). An inconvenient truth about tunneled authentications. In IEEE conference on local computer networks (LCN). https://doi.org/10.1109/LCN.2010.5735754.
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). RFC 3748-Extensible authentication protocol (EAP) (pp. 1–67). Network Working Group, The Internet Society
Genet, T. (2015). A short SPAN+AVISPA tutorial. Research Report. https://hal.inria.fr/hal-01213074v1/document.
Viganò, L. (2006). Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science, 155, 61–86.
Funding
No funding agency.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Research involving human participants and/or animals
No human participations and/or animals has been involved in this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumar, P., Kumar, D. A secure n-secret based client authentication protocol for 802.11 WLANs. Telecommun Syst 75, 259–271 (2020). https://doi.org/10.1007/s11235-020-00683-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-020-00683-9