NOVEL NEUROCOMPUTING-BASED SCHEME TO AUTHENTICATE WLAN USERS EMPLOYING DISTANCE PROXIMITY THRESHOLD

Tarik Guelzim, Mohammad S. Obaidat

2008

Abstract

The IEEE 802.11 standard is considered one of the most popular and profitable network topology in use today. As with the growth of every other technology, the scalability of Wireless Local Area Networks (WLANs) comes with the burden of ensuring the integrity, confidentiality and trust in the network. By integrity we need to develop a mechanism by which only authorized users can gain access to the network resources. Confidentiality implies that every data transmitted by each user stays known only to the communication parties. The above two characteristics can then enforce a trust environment in which all wireless nodes and users are authorized and secure. In this paper, we propose a scheme to authenticate and authorize 802.11 wireless nodes within a network. Our proposed scheme relies on neural networks decision engine that restricts network access to mobile nodes whose physical location is within a threshold distance from the wireless access point or the controller of the network. We present a detailed description of the work done as well as a performance analysis of this scheme.

References

  1. M. S. Obaidat and N. Boudriga,” Security of e-Systems and Computer Networks,” Cambridge University Press, 2007.
  2. P. Nicopolitidis, M. S. Obaidat, G. Papdimitriou, and A. S. Pomportsis,” Wireless Networks,” John Wiley & Sons, 2003.
  3. A.K. Dey, “Understanding and Using Context In Personal and Ubiquitous Computing”, ACM Transactions on Information Systems, vol. 5, pp. 4-7, Feb. 2001 .
  4. R. Want, A. Hopper, V. Falcao, and J. Gibbons. “The active badge location system”, ACM Transactions on Information Systems. Vol. 10, pp. 91-102, Jan. 1992.
  5. N.B. Priyantha, A. Chakraborty, and H. Balakrishnan, “The Cricket Location-Support System”, ACM Int'l Conf. Mobile Computing and Networking”, pp. 32-43, Aug. 2000.
  6. Bahl, P. and V.N. Padmanabhan, “An in-building RFBased Location and Tracking System”, IEEE INFOCOM, Vol. 1, pp. 775-785, Mar. 2000.
  7. V. Seshadri, G.V. Zaruba, and M. Huber, “A Bayesian Sampling Approach to In-door Localization of Wireless Devices Using Received Signal Strength Indication”, IEEE International Conference on Pervasive Computing and Communications. pp. 75-84, Mar. 2005.
  8. R.H. Jan and Y.R. Lee, “An Indoor Geolocation System for Wireless LANs”, IEEE International Conference on Paralled Processing Workshops, p. 29, Oct. 2003.
  9. S. Pandey, F. Anjum, B. Kim, and P Agrawal, “A LowCost Robust Localization Scheme for WLAN”, ACM International workshop on wireless internet, Vol 220, p. 17 2006.
  10. T. Mundt. “Two Methods of Authenticated Positioning”, ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, pp. 25-32, Oct. 2006.
Download


Paper Citation


in Harvard Style

Guelzim T. and S. Obaidat M. (2008). NOVEL NEUROCOMPUTING-BASED SCHEME TO AUTHENTICATE WLAN USERS EMPLOYING DISTANCE PROXIMITY THRESHOLD . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 145-153. DOI: 10.5220/0001929901450153


in Bibtex Style

@conference{secrypt08,
author={Tarik Guelzim and Mohammad S. Obaidat},
title={NOVEL NEUROCOMPUTING-BASED SCHEME TO AUTHENTICATE WLAN USERS EMPLOYING DISTANCE PROXIMITY THRESHOLD},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={145-153},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001929901450153},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - NOVEL NEUROCOMPUTING-BASED SCHEME TO AUTHENTICATE WLAN USERS EMPLOYING DISTANCE PROXIMITY THRESHOLD
SN - 978-989-8111-59-3
AU - Guelzim T.
AU - S. Obaidat M.
PY - 2008
SP - 145
EP - 153
DO - 10.5220/0001929901450153