Please use this identifier to cite or link to this item: https://doi.org/10.1016/j.comnet.2006.05.009
DC FieldValue
dc.titleAccess control protocols with two-layer architecture for wireless networks
dc.contributor.authorWan, Z.
dc.contributor.authorDeng, R.H.
dc.contributor.authorBao, F.
dc.contributor.authorAnanda, A.L.
dc.date.accessioned2013-07-04T07:48:50Z
dc.date.available2013-07-04T07:48:50Z
dc.date.issued2007
dc.identifier.citationWan, Z., Deng, R.H., Bao, F., Ananda, A.L. (2007). Access control protocols with two-layer architecture for wireless networks. Computer Networks 51 (3) : 655-670. ScholarBank@NUS Repository. https://doi.org/10.1016/j.comnet.2006.05.009
dc.identifier.issn13891286
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/39756
dc.description.abstractIn this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the second protocol, referred to as the Stanford protocol, uses public key cryptosystems (PKC) for authentication and performs access control at the link layer. Although both protocols are intended to restrict access to wireless networks only to authorized users, our analysis shows that both protocols have serious security flaws which make them vulnerable to attacks. Then we propose a password-based protocol and a PKC-based protocol for the Lancaster architecture and the Stanford architecture, respectively. Both of our protocols provide mutual authentication, perfect forward secrecy and access control for wireless networks. Moreover, they also provide DoS resistance and identity confidentiality for the client. We present detailed security and performance analysis for our protocols, and show that both of our protocols are secure and efficient for access control in wireless networks. © 2006 Elsevier B.V. All rights reserved.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1016/j.comnet.2006.05.009
dc.sourceScopus
dc.subjectAccess control
dc.subjectSecurity protocol
dc.subjectWireless networks
dc.typeArticle
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1016/j.comnet.2006.05.009
dc.description.sourcetitleComputer Networks
dc.description.volume51
dc.description.issue3
dc.description.page655-670
dc.description.codenCNETD
dc.identifier.isiut000243156000007
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

SCOPUSTM   
Citations

5
checked on Jun 1, 2020

WEB OF SCIENCETM
Citations

3
checked on Jun 1, 2020

Page view(s)

98
checked on Jun 1, 2020

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.