A Privacy Preserving Authentication in WLAN using RADIUS
802.11 access point discovery protocol possesses a common privacy problem. The client needs to send continuous active probe for making a connection with its intended network. This active probe helps the attacker to gain knowledge of favoured network list of the client. Again the client has to send continuous probe to perform the handoff efficiently; a listener can easily capture probe and disclose its favoured network identifiers known as SSIDs which may contain some sensitive information. This problem has been solved partially by some privacy preserving techniques with the help of hidden SSIDs, passive scanning, using undirected active probe and so on. But, these solutions confine to only access point discovery and use open authentication for association .In our research we have proposed a protocol for protecting privacy while implementing strong authentication of network users by RADIUS.
||Access Point, Privacy, SSID, RADIUS
The International Journal of Technology, Knowledge and Society, Volume 6, Issue 4, pp.79-92.
Article: Print (Spiral Bound).
Article: Electronic (PDF File; 993.729KB).
Masters Student, ICT, The Royal Institute of Technology(KTH), Stockholm, Sweden
She has completed her Bachelor in Computer Science & Engineering from Rajshahi University of Engineering & Technology in 2005. After that she was involved in teaching as a lecturer at one the reputed private engineering university Ahsanullah University of Science and Technology (AUST), Bangladesh. After two years of teaching she enrolled in international masters program in Information and Communication System Security (ICSS) at the Royal Institute of Technology (KTH), Sweden and finished her program on March, 2010. Presently she is working as a lecturer the department of Computer Science and Engineering of AUST, Bangladesh. Her main research interest includes distributed systems and network security.
Masters Student, ICT, The Royal Institute of Technology(KTH), stockholm, Sweden
He has earned his B.Sc. degree in Computer Science and Engineering from Rajshahi University of Science and Engineering in 2004. After completion of degree, he has joined as a lecturer in the same department of Rajshahi University of Engineering and Technology. After three years of service, he pursued his masters degree in the international program of Information and Communication System Security (ICSS) from The Royal Institute of Technology (KTH) Sweden. Now he is working as assistant professor in his previous working university. He is basically interested in the fields of wireless security and communication security.
Lecturer, Department of computer and system science, The Royal Institute of Technology(KTH), Stockholm, Sweden
Department of Computer and Systems Science, KTH/SU.
There are currently no reviews of this product.
Write a Review