A Kerberos-based authentication architecture for WLANs: Test beds and experiments

Mohamed Ali Kaafar, Lamia Ben Azzouz, Farouk Kamoun

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

This work addresses the issues related to authentication in wireless LAN environments, with emphasis on the IEEE 802.11 standard. It proposes an authentication architecture for Wireless networks. This architecture called Wireless Kerberos (W-Kerberos), is based on the Kerberos authentication server and the IEEE 802.1X-EAP model, in order to satisfy both security and mobility needs. It then, provides a mean of protecting the network, assuring mutual authentication, thwarts cryptographic attack risks via a key refreshment mechanism and manages fast and secure Handovers between access points. In addition to authentication, Kerberos has also the advantage of secure communications via encryption.

Original languageEnglish
Title of host publicationNetwork Control and Engineering for QoS, Security and Mobility, III
EditorsDominique Gaiti, Sebastia Galmes, Ramon Puigjaner
PublisherSpringer, Springer Nature
Pages43-55
Number of pages13
ISBN (Print)0387231978, 9780387231976
DOIs
Publication statusPublished - 2005
Externally publishedYes
EventIFIP TC6/WG6.2, 6.6, 6.7 and 6.8 3rd International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 - Palma de Mallorca, Spain
Duration: 2 Nov 20045 Nov 2004

Publication series

NameIFIP Advances in Information and Communication Technology
Volume165
ISSN (Print)1868-4238

Conference

ConferenceIFIP TC6/WG6.2, 6.6, 6.7 and 6.8 3rd International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004
Country/TerritorySpain
CityPalma de Mallorca
Period2/11/045/11/04

Keywords

  • EAP
  • IEEE 802.1X
  • Kerberos
  • test beds
  • wireless authentication

Fingerprint

Dive into the research topics of 'A Kerberos-based authentication architecture for WLANs: Test beds and experiments'. Together they form a unique fingerprint.

Cite this