Skip to main content
Top
Published in: Wireless Networks 5/2017

29-02-2016

Enhancing EAP-TLS authentication protocol for IEEE 802.11i

Authors: Bahareh Shojaie, Iman Saberi, Mazleena Salleh

Published in: Wireless Networks | Issue 5/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

IEEE 802.11i authentication framework is composed of the 802.1x and an extensible authentication protocol (EAP) mechanism. One of the most applicable techniques in the EAP methods is EAP-transport layer security (EAP-TLS). The EAP-TLS implementation issues are high execution time; high number of data exchanges between two parties and possibility of closing connection as a result of modification in the contents of the handshake messages, which are all addressed in this paper. This research analyses the EAP-TLS in WLANs to improve this method’s efficiency in terms of the security analysis, time and memory usage. Based on the results, this research proposes an enhanced method with a discrete cryptographic mechanisms and a distinct handshake structure, which reduces the number of steps in the handshake protocol. This enhanced method also provides robust security compared to the original EAP-TLS with approximately the same level of memory usage, which reduces execution time significantly.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef
2.
go back to reference Liao, Y.-P., & Wang, S.-S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24–29.CrossRef Liao, Y.-P., & Wang, S.-S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24–29.CrossRef
3.
go back to reference Chunta, L., & Minshiang, H. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5.CrossRef Chunta, L., & Minshiang, H. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5.CrossRef
4.
go back to reference RFC2284. (1998). Extensible authentication protocol (EAP) (pp. 1–15). Network Working Group. RFC2284. (1998). Extensible authentication protocol (EAP) (pp. 1–15). Network Working Group.
5.
go back to reference Khan, M. K., Kim, S. K., & Alghathbar, K. S. (2011). Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Computer Communications, 34(3), 305–309.CrossRef Khan, M. K., Kim, S. K., & Alghathbar, K. S. (2011). Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Computer Communications, 34(3), 305–309.CrossRef
6.
go back to reference RFC5216. (2008). The EAP-TLS authentication protocol. Network Working Group. RFC5216. (2008). The EAP-TLS authentication protocol. Network Working Group.
7.
go back to reference Chiornită, A., Gheorghe, L., & Rosner, D. (2010). A practical analysis of EAP authentication methods. In Roedunet international conference (RoEduNet), 24–26 June 2010, pp. 31–35. Chiornită, A., Gheorghe, L., & Rosner, D. (2010). A practical analysis of EAP authentication methods. In Roedunet international conference (RoEduNet), 24–26 June 2010, pp. 31–35.
8.
go back to reference Liu, X., & Fapojuwo, A. (2005). An efficient SIM-based authentication and key distribution method for wireless LANs. In Canadian conference on electrical and computer engineering, 1–4 May 2005, pp. 1169–1172. doi:10.1109/CCECE.2005.1557185. Liu, X., & Fapojuwo, A. (2005). An efficient SIM-based authentication and key distribution method for wireless LANs. In Canadian conference on electrical and computer engineering, 1–4 May 2005, pp. 1169–1172. doi:10.​1109/​CCECE.​2005.​1557185.
9.
go back to reference Bhakti, M. A. C., Abdullah, A., & Jung, L. T. (2007). EAP-based authentication for ad hoc network. In Seminar Nasional Aplikasi Teknologi Informasi (SNATI). Bhakti, M. A. C., Abdullah, A., & Jung, L. T. (2007). EAP-based authentication for ad hoc network. In Seminar Nasional Aplikasi Teknologi Informasi (SNATI).
10.
go back to reference Sung-Hyun, E., & Hyoung-Kee, C. (2008). EAP-Kerberos II: An adaptation of Kerberos to EAP for mutual authentication. In IEEE international conference on ITS telecommunications. Sung-Hyun, E., & Hyoung-Kee, C. (2008). EAP-Kerberos II: An adaptation of Kerberos to EAP for mutual authentication. In IEEE international conference on ITS telecommunications.
11.
go back to reference Latze, C., Ultes-Nitsche, U., & Baumgartner, F. (2008). Strong mutual authentication in a user-friendly way in EAP-TLS (pp. 1–5). Latze, C., Ultes-Nitsche, U., & Baumgartner, F. (2008). Strong mutual authentication in a user-friendly way in EAP-TLS (pp. 1–5).
12.
go back to reference Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.CrossRef Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(1), 661–686.CrossRef
13.
go back to reference Wu, Liufei F., Zhang, Yuqing, & Wang, Fengjiao. (2009). A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standards & Interfaces, 31(2), 286–291.CrossRef Wu, Liufei F., Zhang, Yuqing, & Wang, Fengjiao. (2009). A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standards & Interfaces, 31(2), 286–291.CrossRef
14.
go back to reference Ma, Y., & Coo, X. (2003) How to use EAP-TLS authentication in PWLAN environment. In IEEE international conference neural networks and signal processing (pp. 1677–1680), Nanjing, China. Ma, Y., & Coo, X. (2003) How to use EAP-TLS authentication in PWLAN environment. In IEEE international conference neural networks and signal processing (pp. 1677–1680), Nanjing, China.
15.
go back to reference Cordasco, J., Meyer, U., & Wetzel, S. (2005). Implementation and performance evaluation of EAP-TLS-KS (pp. 1–12). New Jersey. Cordasco, J., Meyer, U., & Wetzel, S. (2005). Implementation and performance evaluation of EAP-TLS-KS (pp. 1–12). New Jersey.
16.
go back to reference Kambourakis, G., Rouskas, A., Kormentzas, G., & Gritzalis, S. (2004). Advanced SSL/TLS-based authentication for secure WLAN-3G interworking. In IEE Proceedings, Communications, 24 October 2004, pp. 501–506. doi:10.1049/ip-com:20040835. Kambourakis, G., Rouskas, A., Kormentzas, G., & Gritzalis, S. (2004). Advanced SSL/TLS-based authentication for secure WLAN-3G interworking. In IEE Proceedings, Communications, 24 October 2004, pp. 501–506. doi:10.​1049/​ip-com:​20040835.
17.
go back to reference Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96.CrossRef Akhtar, R., Leng, S., Memon, I., Ali, M., & Zhang, L. (2014). Architecture of hybrid mobile social networks for efficient content delivery. Wireless Personal Communications, 80(1), 85–96.CrossRef
18.
go back to reference Memon, I. (2015). Authentication users privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.CrossRef Memon, I. (2015). Authentication users privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.CrossRef
19.
go back to reference Latze, C., & Ultes-Nitsche, U. (2008). A proof-of-concept implementation of EAP-TLS with TPM support. In ISSA. Latze, C., & Ultes-Nitsche, U. (2008). A proof-of-concept implementation of EAP-TLS with TPM support. In ISSA.
20.
go back to reference RFC3766. (2004). Determining strengths for public keys used for exchanging symmetric keys (pp. 1–23). Network Working Group. RFC3766. (2004). Determining strengths for public keys used for exchanging symmetric keys (pp. 1–23). Network Working Group.
21.
go back to reference Zhao, Y., Lin, C., & Yin, H. (2006). Security authentication of 3G-WLAN interworking. In 20th international conference on advanced information networking and applications. Zhao, Y., Lin, C., & Yin, H. (2006). Security authentication of 3G-WLAN interworking. In 20th international conference on advanced information networking and applications.
22.
go back to reference Yang, J.-H., & Chang, C.-C. (2009). An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security, 28(3–4), 138–143.CrossRef Yang, J.-H., & Chang, C.-C. (2009). An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security, 28(3–4), 138–143.CrossRef
23.
go back to reference Buttyán, L., Dóra, L. (2009). An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks (pp. 1–6). Buttyán, L., Dóra, L. (2009). An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks (pp. 1–6).
24.
go back to reference Huang, L., Huang, Y., Gao, Z., Lin, J., & Jiang, X. (2009) Performance of authentication protocols in LTE environments. In 2009 international conference on computational intelligence and security (pp. 293–297). 28(3-4):138–143. Huang, L., Huang, Y., Gao, Z., Lin, J., & Jiang, X. (2009) Performance of authentication protocols in LTE environments. In 2009 international conference on computational intelligence and security (pp. 293–297). 28(3-4):138–143.
25.
go back to reference Badra, M. (2011). Securing communications between multiple entities using a single TLS session (pp. 1–4). Badra, M. (2011). Securing communications between multiple entities using a single TLS session (pp. 1–4).
26.
go back to reference RFC2716. (1999). PPP EAP TLS authentication protocol (pp. 1–24). Network Working Group. RFC2716. (1999). PPP EAP TLS authentication protocol (pp. 1–24). Network Working Group.
27.
go back to reference Xu, Q., Wan, C., & Hu, A. (2008). The performance analysis of fast EAP re-authentication protocol. In ISCSCT2008 (pp. 99–103). Xu, Q., Wan, C., & Hu, A. (2008). The performance analysis of fast EAP re-authentication protocol. In ISCSCT2008 (pp. 99–103).
28.
go back to reference Hwang, S., Cho, S., & Park, S. (2009). Keystroke dynamics-based authentication for mobile devices. Computers & Security, 28(1–2), 85–93.CrossRef Hwang, S., Cho, S., & Park, S. (2009). Keystroke dynamics-based authentication for mobile devices. Computers & Security, 28(1–2), 85–93.CrossRef
29.
go back to reference Systems, C. (2002). Extensible authentication protocol transport layer security deployment guide for wireless LAN networks (pp. 1–42). Systems, C. (2002). Extensible authentication protocol transport layer security deployment guide for wireless LAN networks (pp. 1–42).
30.
go back to reference Mitchell, J., Roy, A., Rowe, P., & Scedrov, A. (2008). Analysis of EAP-GPSK authentication protocol. In S. Bellovin, R. Gennaro, A. Keromytis, & M. Yung (Eds.), Applied cryptography and network security (Vol. 5037, pp. 309–327). Berlin: Springer.CrossRef Mitchell, J., Roy, A., Rowe, P., & Scedrov, A. (2008). Analysis of EAP-GPSK authentication protocol. In S. Bellovin, R. Gennaro, A. Keromytis, & M. Yung (Eds.), Applied cryptography and network security (Vol. 5037, pp. 309–327). Berlin: Springer.CrossRef
31.
go back to reference Narmadha, R., & Malarkan, S. (2012). Performance evaluation of EAP-TLS authentication protocol for UMTS-WiMAX interworking. In P. V. Krishna, M. R. Babu, & E. Ariwa (Eds.), Global trends in computing and communication systems (Vol. 269, pp. 697–702). Berlin: Springer.CrossRef Narmadha, R., & Malarkan, S. (2012). Performance evaluation of EAP-TLS authentication protocol for UMTS-WiMAX interworking. In P. V. Krishna, M. R. Babu, & E. Ariwa (Eds.), Global trends in computing and communication systems (Vol. 269, pp. 697–702). Berlin: Springer.CrossRef
32.
go back to reference Marin, R., Zapata, S., & Gomez, A. (2007). Secure protocol for fast authentication in EAP-based wireless networks. In O. Gervasi & M. Gavrilova (Eds.), Computational science and its applications–ICCSA 2007 (Vol. 4706, pp. 1038–1051). Berlin: Springer.CrossRef Marin, R., Zapata, S., & Gomez, A. (2007). Secure protocol for fast authentication in EAP-based wireless networks. In O. Gervasi & M. Gavrilova (Eds.), Computational science and its applications–ICCSA 2007 (Vol. 4706, pp. 1038–1051). Berlin: Springer.CrossRef
33.
go back to reference Narmadha, R., Malarkan, S., & Ramesh, C. (2011). Performance analysis of signaling cost on EAP-TLS authentication protocol based on cryptography. International Journal of Computer Applications, 33(7), 18–23. Narmadha, R., Malarkan, S., & Ramesh, C. (2011). Performance analysis of signaling cost on EAP-TLS authentication protocol based on cryptography. International Journal of Computer Applications, 33(7), 18–23.
34.
go back to reference Robshaw, M. J. B., & Yin, Y. L. (1997). Elliptic curve cryptosystems. An RSA Laboratories Technical Note. Robshaw, M. J. B., & Yin, Y. L. (1997). Elliptic curve cryptosystems. An RSA Laboratories Technical Note.
35.
go back to reference Burr, W. E., Dodson, D. F., & Polk, W. T. (2004). Electronic authentication guideline. US Department of Commerce, Technology Administration, National Institute of Standards and Technology. Burr, W. E., Dodson, D. F., & Polk, W. T. (2004). Electronic authentication guideline. US Department of Commerce, Technology Administration, National Institute of Standards and Technology.
36.
go back to reference Forouzan, B. A. (2008). Traditional Symmetric-Key Ciphers. In Introduction to cryptography and network security (1st ed.). New York, NY: McGraw-Hill. Forouzan, B. A. (2008). Traditional Symmetric-Key Ciphers. In Introduction to cryptography and network security (1st ed.). New York, NY: McGraw-Hill.
37.
go back to reference Saberi, I., Shojaie, B., & Salleh, M. (2011). Enhanced key expansion for AES-256 by using even-odd method. In 2nd international conference on research and innovation in information systems –2011 (ICRIIS’11) (pp. 5), IEEE, Kuala Lumpur. Saberi, I., Shojaie, B., & Salleh, M. (2011). Enhanced key expansion for AES-256 by using even-odd method. In 2nd international conference on research and innovation in information systems2011 (ICRIIS’11) (pp. 5), IEEE, Kuala Lumpur.
Metadata
Title
Enhancing EAP-TLS authentication protocol for IEEE 802.11i
Authors
Bahareh Shojaie
Iman Saberi
Mazleena Salleh
Publication date
29-02-2016
Publisher
Springer US
Published in
Wireless Networks / Issue 5/2017
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1210-6

Other articles of this Issue 5/2017

Wireless Networks 5/2017 Go to the issue