Contents & References of Improving authentication in the security of wireless LANs 11.802 with an emphasis on the cache mechanism at the access point
List:
Abstract. 1
Introduction. 2
Wireless networks. 5
1-1 classification of wireless networks in terms of extent. 5
1-1-1 Wide wireless networks. 6
1-1-2 urban wireless networks. 7
1-1-3 Personal wireless networks. 8
1-1-4 local wireless networks. 9
1-2 Introduction of wide wireless networks. 11
1-3 wireless network integration. 12
1-3-1 case topology. 12
1-4 Supported signals in wireless LANs. 17
1-5 IEEE 802.11 standard. 17
1-6 types of access points. 21
1-7 Security in local networks based on the 802.11 standard. 22
1-8 methods of securing wireless networks. 24
AAA servers. 25
2-1 Overview of AAA Server. 25
2-1-1 An overview of the concept of Authentication. 26
2-1-2 An overview of the concept of Authorization. 27
2-1-3 Overview of the concept of Accounting. 29
2-2 Identity verification methods in wireless network. 30
2-3 EAP methods. 31
2-4 change of environment. 32
2-5 security problems and delay. 35
2-6 IPsec concepts and SA usage. 36
2-7 Overview of Mobile-IP and Handoff process. 37
Research history and background. 41
3-1 Work performed in the field of Handoff security. 41
3-1-1 Pre-Authentication by storing the key in the cache. 41
3-1-2 Use of IAPP protocol for interactions between access points. 43
3-1-3 Reauthentication delay reduction in Handoff. 45
3-1-4 Handoff delay reduction using FHR method. 47
3-1-5 Handoff delay reduction using PNC method. 50
3-1-6 Handoff delay reduction using SNC method. 52
3-1-7 Using the method of temporary servers. 55
3-1-8 Handoff delay reduction using ANC method. 57
3-2 Work done on EAP security. 60
Suggested idea and method. 65
4-1 Proposed method. 66
4-2 Evaluation of the proposed method. 71
4-2-1 First step. 71
4-2-2 The second step. 73
Conclusion. 74
5-1 Comparison of simulation results. 74
Summary and future work. 78
6-1 Summary. 78
6-2 Future work. 79 References 81 Source: M. Mohammadipour, "Classified fast handoff model, Borujerd Islamic Azad University, 1390. [2] W. Wang, "A Local Authentication Control Scheme Based on AAA Architecture in Wireless Networks," vol. 00, no. C, pp. 5276–5280, 2004. [3] P. Protocol and A. Distribution, IEEE Standards, no. July. 2003.
[4] L. A. N. Man, S. Committee, and I. Computer, I E E E Standard for Local and metropolitan area networks Media Access Control ( MAC ) Security IEEE Computer Society Sponsored by the, no. Aug. 2006. [5] I. Standard, Supplement to IEEE Standard for Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 11: Wireless LAN Medium Access Control ( MAC ) and Physical Layer (, vol. 1999. 1999.
[6] T. P. M. Corss, N. Johnson, Security+. Syngress, 2002. [7] F. Majstor and S. C. Engineer, “WLAN Security Threats & Solutions,” p. 2003. Majid Nakhjiri, AAA.and.Network.Diameter.EAP.PKI.and.Mobility.
J. Zhang, Y. Ma, and J. Jia, The Journal of China Universities and Telecommunications, vol. 2, pp. 81-86. 2012. [11] R. Dantu, G. Clothier, and A. Atri, “EAP methods for wireless networks,” Computer Standards & Interfaces, vol. 29, no. 3, pp. 289–301, Mar. 2007.
[12] C. Fan, Y. Lin, and R. Hsu, “Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802. 11 Wireless LANs,” vol.24, no. 4, pp. 672–680, 2013.
[13] Y. Wei-dong, L. Ji-zhao, W. Ke, and S. Li-Ming, “Authentication Protocols to Support Fast Handoff for 802.11s Mesh Networks,” 2010 International Conference on Multimedia Information Networking and Security, pp. 644–648, 2010.
[14] A. Gurtov, Host Identity Protocol - (HIP). 2008, p. 332 pages.
[15] L. Butty, “An authentication scheme for fast handover between WiFi access points,” 2007.
[16] A. Mishra and M. S. William, “Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network,” vol. 00, no. C, 2004.
[17] T. Aura and M. Roe, "Reducing Reauthentication Delay in Wireless Networks," First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), pp. 139–148, 2005.
[18] S. Pack and Y. Choi, “Fast handoff scheme based on mobility prediction in public wireless LAN systems,” pp. 489–495.
[19] X. Vasilakos, V. A. Siris, G. C. Polyzos, and M. Pomonis, “Proactive Selective Neighbor Caching for Enhancing Mobility Support in Information-Centric Networks,” pp. 61–66, 2012.
[20] V. A. Siris, X. Vasilakos, and G. C. Polyzos, “A Selective Neighbor Caching Approach for Supporting Mobility in Publish/Subscribe Networks,” 2010.
[21] C.-H. Yu, M. Pan, and S.-D. Wang, “Adaptive Neighbor Caching for Fast BSS Transition Using IEEE 802.11k Neighbor Report,” 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 353–360, Dec. 2008.
[22] C. Yang, J. Ma, and X. Dong, “A New Evaluation Model for Security Protocols,” vol. 6, no. 6, pp. 485-494, 2011. [23] Mehdi. Khabaz, "Providing an approach to improve QoS in order to control access to wireless network resources based on the AAA protocol, Islamic Azad University, Tehran North Branch, 2013. [24] M. Akhgari, "Providing an approach to increase the security of wireless networks based on the AAA model, Islamic Azad University, Zanjan Branch, 2019.