Improving authentication in the security of wireless LANs 11.802 with an emphasis on the cache mechanism at the access point

Number of pages: 91 File Format: word File Code: 30464
Year: 2013 University Degree: Master's degree Category: Computer Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Improving authentication in the security of wireless LANs 11.802 with an emphasis on the cache mechanism at the access point

    Master thesis

    Software trend

    Abstract

             Today, the world of communication is developing at an indescribable speed and the Internet plays a significant role in this development. Mobile users want access to the Internet and wireless networks have provided this possibility. {Formatting Citation} Establishing secure communication and user security and maintaining service quality[1] at an acceptable level for users are among the most important issues of wireless network access. There are many solutions to ensure the security of users, one of which is the use of EAP methods, in this method, users must be authenticated, and on the other hand, the authentication process is time-consuming. In this research, by using the cache mechanism in the access points, the handoff process was done faster, and subsequently, the authentication time was reduced and the possibility of using stronger security protocols was provided. It is worth noting that the role of the access point is very vital and important in this research.

     

    Keywords - developed authentication protocol [2]; authentication, authorization and audit servers [3]; Handoff; access point[4]; Cache memory.[5]

    Introduction

    Today, with the improvement of performance, efficiency and security factors, wireless local area networks are growing and expanding significantly, and the IEEE 802.11 standard is the basic standard that wireless local area networks are designed and implemented based on. The need to provide security and improve it in wireless local networks has been much considered and investigated. One of the security solutions is to use the AAA security model, and each of the processes of this security model, including authentication, authorization and auditing, have mechanisms to ensure security. In this research, the authentication process is discussed. If the AAA security model is used in the wireless local network, the security and quality of service, which are two important factors in creating a good connection, will be affected. Due to the process of authentication and reducing the time of this stage of communication, a stronger security protocol can be used. In the proposed method, the access point plays an important role, and the way access points interact with mobile nodes is described in the proposed flowchart. Compared to other methods of establishing security in the wireless network, relying on the idea of ??the proposed method, a tremendous improvement in security can be achieved.

    The structure of this thesis is as follows: the first chapter is an overview of some concepts of wireless networks, the second chapter is an overview of some concepts of AAA servers. The background of the research is stated in the third chapter. The fourth chapter explains the proposed idea and method, followed by the conclusion, conclusion, and future work in the fifth and sixth chapters, respectively.

    Overview

    Wireless networks

    This chapter will provide an overview of the concepts and operation of wireless networks regarding security.

    1-1 Classification of wireless networks In terms of extent

    wireless networks are divided into four main categories according to the extent of the area of ??the network they cover [4] [1]:

    wide wireless networks[6]

    city wireless networks[7]

    local wireless networks[8]

    personal wireless network[9]

    1-1-1 networks Broadband wireless

    In these networks, it is possible to communicate between cities or even countries using different satellite systems. The above networks are known as second generation systems and are generally networks with high wireless coverage. An example of these networks is the cellular wireless structure used in mobile phone networks. In these networks, due to the network structure and access technology of network users, a wide area is covered by them. Among these technologies, AMPS[10], second generation digital cellular networks such as GSM[11] in Europe, PDC cellular networks[12] in Japan and third generation cellular networks such as UMTS[13] can be mentioned[1]. The above networks are often used as cable backup networks (copper, optical fiber). Urban wireless networks are networks whose coverage area is limited to the urban area. Among the standards of this network, we can mention the IEEE802.16 [14] standard.  The most famous 802.11. Which is called WiFi was produced by an electrical and electronic engineer. This standard defines all the fields of the radio frequency wireless network. Depending on the type of standard it follows, they have a range of up to 400 meters. WiFi can be an effective and valuable way to expand indoor networks without the expense of wiring an office[1][3].

    WiFi allows APs to reach a perimeter, or hotspot, up to a radius of approx. It covers 100 meters in the interior space of the building. Depending on the conditions, outdoor WiFi can cover a radius of 300 meters, depending on the environmental conditions. The transmission speed in WiFi standards is different and ranges from 11Mbps to 54Mbps.

    The advantages of WiFi include the following:

    Using the frequency band without permission

    Less international restrictions

    Architecture Its structure allows it to be used everywhere and spread quickly.

    Low cost,

    ability to move without disconnecting from the network.

    But the disadvantages of WiFi are as follows:

    Usage From the 2.4 GHZ frequency band, which is susceptible to interference and noise.

    Compared to other standards, it consumes more energy.

    1-1-3 Personal wireless networks

    In these networks, the possibility of communication between personal devices such as handheld computers [15] in a limited area (about 914 centimeter) is provided. In this type of networks, two common technologies IR [16] and Bluetooth [17] are used. On the other hand, personal wireless networks are included in the category of ad hoc networks. Personal wireless networks, which have a communication range of about 10 meters, have been created in order to simplify the communication between computers, mobile phones and handheld computers [18]. The best known technology for personal wireless networks is the Bluetooth standard[1].

    1-1-4 Local wireless networks

    These networks allow users living in a limited area such as a university or library campus to access the network or the Internet. Compared to wired local networks, national wireless networks offer higher flexibility and portability to network users. In such networks, users connect to the network and benefit from its facilities by establishing a wireless connection with a device called an access point. The IEEE 802.11 standard is one of the prominent standards in wireless local networks that provides a data transfer rate of about 1Mbps to 100Mbps in two frequency bands of 5 and 2.4 GHz for network users. Another prominent standard in wireless local networks is the standard [19] Hiperlan. This standard works in the 5 GHz frequency band. Hipelan 1 has a data transfer rate of 19 MB/s and standard Hiperlan 2 has a transfer rate of 54 MB/s and supports "quality of service" [20] [1].

    (images are in the main file)

    Figure 1.1 shows the three main categories of wireless networks and their coverage area. As can be seen in the figure, among the wireless LAN standards, the 802.11a standard supports a higher transmission rate and switching speed compared to other standards. On the other hand, it is clear that generally cellular networks offer their users a higher transfer speed. Figure 1.1 is a comparison of the transmission rate and the speed of moving nodes in different categories of wireless networks. Mobile users need to access the Internet and the wireless networks made it possible for them. In fact, the safety as well as secure user's communication and the quality of services are the significant factors of accessing wireless network for users. There are many approaches in order to prepare security for users, that one of them is Extended Authentication Protocol method. In this method all users must be authenticated, however, the authentication process is time consuming. In this paper, mechanism of handoff process takes a short time when the cache memory is used in access point and consequently the authentication time decreased so using strong security method is possible.

  • Contents & References of Improving authentication in the security of wireless LANs 11.802 with an emphasis on the cache mechanism at the access point

    List:

    Abstract. 1

    Introduction. 2

    Wireless networks. 5

    1-1 classification of wireless networks in terms of extent. 5

    1-1-1 Wide wireless networks. 6

    1-1-2 urban wireless networks. 7

    1-1-3 Personal wireless networks. 8

    1-1-4 local wireless networks. 9

    1-2 Introduction of wide wireless networks. 11

    1-3 wireless network integration. 12

    1-3-1 case topology. 12

    1-4 Supported signals in wireless LANs. 17

    1-5 IEEE 802.11 standard. 17

    1-6 types of access points. 21

    1-7 Security in local networks based on the 802.11 standard. 22

    1-8 methods of securing wireless networks. 24

    AAA servers. 25

    2-1 Overview of AAA Server. 25

    2-1-1 An overview of the concept of Authentication. 26

    2-1-2 An overview of the concept of Authorization. 27

    2-1-3 Overview of the concept of Accounting. 29

    2-2 Identity verification methods in wireless network. 30

    2-3 EAP methods. 31

    2-4 change of environment. 32

    2-5 security problems and delay. 35

    2-6 IPsec concepts and SA usage. 36

    2-7 Overview of Mobile-IP and Handoff process. 37

    Research history and background. 41

    3-1 Work performed in the field of Handoff security. 41

    3-1-1 Pre-Authentication by storing the key in the cache. 41

    3-1-2 Use of IAPP protocol for interactions between access points. 43

    3-1-3 Reauthentication delay reduction in Handoff. 45

    3-1-4 Handoff delay reduction using FHR method. 47

    3-1-5 Handoff delay reduction using PNC method. 50

    3-1-6 Handoff delay reduction using SNC method. 52

    3-1-7 Using the method of temporary servers. 55

    3-1-8 Handoff delay reduction using ANC method. 57

    3-2 Work done on EAP security. 60

    Suggested idea and method. 65

    4-1 Proposed method. 66

    4-2 Evaluation of the proposed method. 71

    4-2-1 First step. 71

    4-2-2 The second step. 73

    Conclusion. 74

    5-1 Comparison of simulation results. 74

    Summary and future work. 78

    6-1 Summary. 78

    6-2 Future work. 79 References 81 Source: M. Mohammadipour, "Classified fast handoff model, Borujerd Islamic Azad University, 1390. [2] W. Wang, "A Local Authentication Control Scheme Based on AAA Architecture in Wireless Networks," vol. 00, no. C, pp. 5276–5280, 2004. [3] P. Protocol and A. Distribution, IEEE Standards, no. July. 2003.

    [4] L. A. N. Man, S. Committee, and I. Computer, I E E E Standard for Local and metropolitan area networks Media Access Control ( MAC ) Security IEEE Computer Society Sponsored by the, no. Aug. 2006. [5] I. Standard, Supplement to IEEE Standard for Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 11: Wireless LAN Medium Access Control ( MAC ) and Physical Layer (, vol. 1999. 1999.

    [6] T. P. M. Corss, N. Johnson, Security+. Syngress, 2002. [7] F. Majstor and S. C. Engineer, “WLAN Security Threats & Solutions,” p. 2003. Majid Nakhjiri, AAA.and.Network.Diameter.EAP.PKI.and.Mobility.

    J. Zhang, Y. Ma, and J. Jia, The Journal of China Universities and Telecommunications, vol. 2, pp. 81-86. 2012. [11] R. Dantu, G. Clothier, and A. Atri, “EAP methods for wireless networks,” Computer Standards & Interfaces, vol. 29, no. 3, pp. 289–301, Mar. 2007.

    [12] C. Fan, Y. Lin, and R. Hsu, “Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802. 11 Wireless LANs,” vol.24, no. 4, pp. 672–680, 2013.

    [13] Y. Wei-dong, L. Ji-zhao, W. Ke, and S. Li-Ming, “Authentication Protocols to Support Fast Handoff for 802.11s Mesh Networks,” 2010 International Conference on Multimedia Information Networking and Security, pp. 644–648, 2010.

    [14] A. Gurtov, Host Identity Protocol - (HIP). 2008, p. 332 pages.

    [15] L. Butty, “An authentication scheme for fast handover between WiFi access points,” 2007.

    [16] A. Mishra and M. S. William, “Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network,” vol. 00, no. C, 2004.

    [17] T. Aura and M. Roe, "Reducing Reauthentication Delay in Wireless Networks," First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), pp. 139–148, 2005.

    [18] S. Pack and Y. Choi, “Fast handoff scheme based on mobility prediction in public wireless LAN systems,” pp. 489–495.

    [19] X. Vasilakos, V. A. Siris, G. C. Polyzos, and M. Pomonis, “Proactive Selective Neighbor Caching for Enhancing Mobility Support in Information-Centric Networks,” pp. 61–66, 2012.

    [20] V. A. Siris, X. Vasilakos, and G. C. Polyzos, “A Selective Neighbor Caching Approach for Supporting Mobility in Publish/Subscribe Networks,” 2010.

    [21] C.-H. Yu, M. Pan, and S.-D. Wang, “Adaptive Neighbor Caching for Fast BSS Transition Using IEEE 802.11k Neighbor Report,” 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 353–360, Dec. 2008.

    [22] C. Yang, J. Ma, and X. Dong, “A New Evaluation Model for Security Protocols,” vol. 6, no. 6, pp. 485-494, 2011. [23] Mehdi. Khabaz, "Providing an approach to improve QoS in order to control access to wireless network resources based on the AAA protocol, Islamic Azad University, Tehran North Branch, 2013. [24] M. Akhgari, "Providing an approach to increase the security of wireless networks based on the AAA model, Islamic Azad University, Zanjan Branch, 2019.

Improving authentication in the security of wireless LANs 11.802 with an emphasis on the cache mechanism at the access point