为 IEEE 802.11 无线网络开发稳健且低延迟的安全框架

Inam Ul Haq, Amna Nadeem, Saba Ramzan, Nazir Ahmad, Yasir Ahmad
{"title":"为 IEEE 802.11 无线网络开发稳健且低延迟的安全框架","authors":"Inam Ul Haq, Amna Nadeem, Saba Ramzan, Nazir Ahmad, Yasir Ahmad","doi":"10.12785/ijcds/1501112","DOIUrl":null,"url":null,"abstract":": Due to inherent vulnerability, wireless networks require additional security, integrity, and authentication. The purpose of this study is to highlight the outdated ”Counter Mode Cipher Block Chaining Message Authentication Code Protocol” (CCMP) that has lately taken the place of the flawed ”Wired Equivalent Privacy” (WEP) protocol for authenticating IEEE 802.11 (WLANs). The IEEE 802.11s, a draught widespread for wireless networks in a mesh topology, also recommended using CCMP (WMNs). Due to CCMP’s two-pass operation, multi-hop wireless networks like WMN have a considerable latency problem. An increase in latency results in a decrease in service quality for multimedia applications as it is sensitive to delays. In addition to highlighting the CCMP’s vulnerability to pre-computation time-memory trade-o ff (TMTO) attacks, this paper recommends improving WLAN packet security by implementing a packet-by-packet security mechanism. Furthermore, we propose a fresh, dependable, low-latency foundation for WMN. Our security framework architecture employs a piggyback challenge-response mechanism to ensure data secrecy and data integrity. The use of a secret nonce, a new encryption key for each packet, and packet-level authentication are all features of the Piggyback challenge-response protocol. By authenticating every packet, unauthorized access can be swiftly prevented.","PeriodicalId":37180,"journal":{"name":"International Journal of Computing and Digital Systems","volume":"39 9","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Towards Robust and Low Latency Security Framework for\\nIEEE 802.11 Wireless Networks\",\"authors\":\"Inam Ul Haq, Amna Nadeem, Saba Ramzan, Nazir Ahmad, Yasir Ahmad\",\"doi\":\"10.12785/ijcds/1501112\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": Due to inherent vulnerability, wireless networks require additional security, integrity, and authentication. The purpose of this study is to highlight the outdated ”Counter Mode Cipher Block Chaining Message Authentication Code Protocol” (CCMP) that has lately taken the place of the flawed ”Wired Equivalent Privacy” (WEP) protocol for authenticating IEEE 802.11 (WLANs). The IEEE 802.11s, a draught widespread for wireless networks in a mesh topology, also recommended using CCMP (WMNs). Due to CCMP’s two-pass operation, multi-hop wireless networks like WMN have a considerable latency problem. An increase in latency results in a decrease in service quality for multimedia applications as it is sensitive to delays. In addition to highlighting the CCMP’s vulnerability to pre-computation time-memory trade-o ff (TMTO) attacks, this paper recommends improving WLAN packet security by implementing a packet-by-packet security mechanism. Furthermore, we propose a fresh, dependable, low-latency foundation for WMN. Our security framework architecture employs a piggyback challenge-response mechanism to ensure data secrecy and data integrity. The use of a secret nonce, a new encryption key for each packet, and packet-level authentication are all features of the Piggyback challenge-response protocol. By authenticating every packet, unauthorized access can be swiftly prevented.\",\"PeriodicalId\":37180,\"journal\":{\"name\":\"International Journal of Computing and Digital Systems\",\"volume\":\"39 9\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computing and Digital Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12785/ijcds/1501112\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computing and Digital Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12785/ijcds/1501112","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

:由于固有的脆弱性,无线网络需要额外的安全性、完整性和认证。本研究的目的是强调过时的 "计数模式密码块链式信息验证码协议"(CCMP),它最近取代了有缺陷的 "有线等效保密"(WEP)协议,用于验证 IEEE 802.11(无线局域网)。IEEE 802.11s 是一份针对网状拓扑结构无线网络的广泛草案,也建议使用 CCMP(WMN)。由于 CCMP 采用双路运行,WMN 等多跳无线网络存在相当大的延迟问题。延迟的增加会导致多媒体应用的服务质量下降,因为多媒体应用对延迟非常敏感。除了强调 CCMP 易受计算前时间-内存交易(TMTO)攻击之外,本文还建议通过实施逐包安全机制来提高无线局域网数据包的安全性。此外,我们还为 WMN 提出了一种全新、可靠、低延迟的基础。我们的安全框架结构采用了回溯挑战-响应机制,以确保数据保密性和数据完整性。使用秘密非ce、为每个数据包提供新的加密密钥以及数据包级验证都是猪背式挑战-响应协议的特点。通过对每个数据包进行验证,可以迅速防止未经授权的访问。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Towards Robust and Low Latency Security Framework for IEEE 802.11 Wireless Networks
: Due to inherent vulnerability, wireless networks require additional security, integrity, and authentication. The purpose of this study is to highlight the outdated ”Counter Mode Cipher Block Chaining Message Authentication Code Protocol” (CCMP) that has lately taken the place of the flawed ”Wired Equivalent Privacy” (WEP) protocol for authenticating IEEE 802.11 (WLANs). The IEEE 802.11s, a draught widespread for wireless networks in a mesh topology, also recommended using CCMP (WMNs). Due to CCMP’s two-pass operation, multi-hop wireless networks like WMN have a considerable latency problem. An increase in latency results in a decrease in service quality for multimedia applications as it is sensitive to delays. In addition to highlighting the CCMP’s vulnerability to pre-computation time-memory trade-o ff (TMTO) attacks, this paper recommends improving WLAN packet security by implementing a packet-by-packet security mechanism. Furthermore, we propose a fresh, dependable, low-latency foundation for WMN. Our security framework architecture employs a piggyback challenge-response mechanism to ensure data secrecy and data integrity. The use of a secret nonce, a new encryption key for each packet, and packet-level authentication are all features of the Piggyback challenge-response protocol. By authenticating every packet, unauthorized access can be swiftly prevented.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Computing and Digital Systems
International Journal of Computing and Digital Systems Business, Management and Accounting-Management of Technology and Innovation
CiteScore
1.70
自引率
0.00%
发文量
111
期刊最新文献
Application of Optimized Deep Learning Mechanism for Recognition and Categorization of Retinal Diseases Application of Optimized Deep Learning Mechanism for Recognition and Categorization of Retinal Diseases IoT-based AI Methods for Indoor Air Quality Monitoring Systems: A Systematic Review Machine Learning Based Smartphone Screen GestureRecognition Using Smartphone Embedded Accelerometer and Gyroscope QR Shield: A Dual Machine Learning Approach Towards Securing QR Codes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1