Please use this identifier to cite or link to this item:
http://drsr.daiict.ac.in//handle/123456789/318
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Das, Manik Lal | |
dc.contributor.author | Singh, Saurabh | |
dc.date.accessioned | 2017-06-10T14:38:41Z | |
dc.date.available | 2017-06-10T14:38:41Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Singh, Saurabh (2011). Wireless LAN 802.11 security using elliptic curve cryptography. Dhirubhai Ambani Institute of Information and Communication Technology, ix, 50 p. (Acc.No: T00281) | |
dc.identifier.uri | http://drsr.daiict.ac.in/handle/123456789/318 | |
dc.description.abstract | IEEE 802.11 is a standard defines the specification of Wireless Local Area Network (WLAN), came into existence in 1997. As communication medium is wireless, security is a major concern to protect the data from adversary. Existing WLAN security is primarily based on Symmetric Key Cryptography (SKC). But, major disadvantage with SKC is establishment of secret key for secure data delivery. Public key cryptography(PKC) has many advantages over Symmetric key cryptography like key management key distribution over insecure channel etc. However, PKC requires a large key size in comparison to SKC to provide same level of security. This makes PKC costly operation and not suitable for the environment like WLAN where limited memory is available for WLAN devices. In recent years, Elliptic Curve Cryptography (ECC) has gained a lot of attention from research communities, because ECC seems to promise simillar or a better level of security with smaller key size in comparison with conventional PKC (e.g. RSA, DSS). These features make them workable under constraint environment. In this thesis, we have studied the security evolution of WLAN 802.11 with Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). We have observed some limitations of WEP and WPA. We, then, present a new protocol using ECC for mutual authentication and session key establishment. We compare our protocol with simillar protocols for wireless security and show that the proposed protocol is efficient w.r.t. space, bandwidth and computational cost at Client side. The security analysis of proposed protocol shows that it may achieve forward secrecy with respect to Client, joint key control, key integrity and resists guessing, replay, impersonantion attacks. A thorough forrmal security analysis is required to be done. | |
dc.publisher | Dhirubhai Ambani Institute of Information and Communication Technology | |
dc.subject | Data processing | |
dc.subject | Public key cryptography | |
dc.subject | Data encryption | |
dc.subject | Security measures | |
dc.subject | Wireless communication systems | |
dc.subject | Wireless LANs | |
dc.classification.ddc | 005.82 SIN | |
dc.title | Wireless LAN 802.11 security using elliptic curve cryptography | |
dc.type | Dissertation | |
dc.degree | M. Tech | |
dc.student.id | 200911001 | |
dc.accession.number | T00281 | |
Appears in Collections: | M Tech Dissertations |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
200911001.pdf Restricted Access | 349.35 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.