An EAP Framework for Unified Authentication in Wireless Networks

View/ Open
Author(s)
Sithirasenan, Elankayer
Kumar, Saurabh
Ramezani, Khosrow
Muthukkumarasamy, V
Griffith University Author(s)
Year published
2011
Metadata
Show full item recordAbstract
Rapid convergence of heterogeneous wireless communication technologies such as Wireless Local Area Networks (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) etc., attract new opportunities for collaborative usage. More and more applications are emerging to benefit from their advantages. However, with the range of approaches that are used to authenticate the wireless devices in such heterogeneous environments, users are skeptical and looking for more user friendly, flexible and reliable ways to interconnect and utilize these different classes of wireless networks. Wireless network ...
View more >Rapid convergence of heterogeneous wireless communication technologies such as Wireless Local Area Networks (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) etc., attract new opportunities for collaborative usage. More and more applications are emerging to benefit from their advantages. However, with the range of approaches that are used to authenticate the wireless devices in such heterogeneous environments, users are skeptical and looking for more user friendly, flexible and reliable ways to interconnect and utilize these different classes of wireless networks. Wireless network users access the different types of wireless networks either independently or cooperatively. In either case, adequate security provision is critical for the successful operation of the networks. Moreover, emerging technologies should provide seamless transition / migration between these networks. Hence the ability to use a single but unique set of credentials to authenticate the wireless devices in heterogeneous wireless network environments would be an anticipated desire of most users. In this paper a number of authentication mechanisms are examined and evaluated for their advantages and limitations. We then propose a unified authentication protocol that can be encapsulated within the RADIUS protocol utilizing the advantages of public key infrastructure. The preliminary experimental results demonstrate that the proposed protocol is feasible and relatively fast.
View less >
View more >Rapid convergence of heterogeneous wireless communication technologies such as Wireless Local Area Networks (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) etc., attract new opportunities for collaborative usage. More and more applications are emerging to benefit from their advantages. However, with the range of approaches that are used to authenticate the wireless devices in such heterogeneous environments, users are skeptical and looking for more user friendly, flexible and reliable ways to interconnect and utilize these different classes of wireless networks. Wireless network users access the different types of wireless networks either independently or cooperatively. In either case, adequate security provision is critical for the successful operation of the networks. Moreover, emerging technologies should provide seamless transition / migration between these networks. Hence the ability to use a single but unique set of credentials to authenticate the wireless devices in heterogeneous wireless network environments would be an anticipated desire of most users. In this paper a number of authentication mechanisms are examined and evaluated for their advantages and limitations. We then propose a unified authentication protocol that can be encapsulated within the RADIUS protocol utilizing the advantages of public key infrastructure. The preliminary experimental results demonstrate that the proposed protocol is feasible and relatively fast.
View less >
Conference Title
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11
Copyright Statement
© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Subject
Wireless Communications
Communications Technologies not elsewhere classified