Please use this identifier to cite or link to this item: http://drsr.daiict.ac.in//handle/123456789/318
Title: Wireless LAN 802.11 security using elliptic curve cryptography
Authors: Das, Manik Lal
Singh, Saurabh
Keywords: Data processing
Public key cryptography
Data encryption
Security measures
Wireless communication systems
Wireless LANs
Issue Date: 2011
Publisher: Dhirubhai Ambani Institute of Information and Communication Technology
Citation: Singh, Saurabh (2011). Wireless LAN 802.11 security using elliptic curve cryptography. Dhirubhai Ambani Institute of Information and Communication Technology, ix, 50 p. (Acc.No: T00281)
Abstract: IEEE 802.11 is a standard defines the specification of Wireless Local Area Network (WLAN), came into existence in 1997. As communication medium is wireless, security is a major concern to protect the data from adversary. Existing WLAN security is primarily based on Symmetric Key Cryptography (SKC). But, major disadvantage with SKC is establishment of secret key for secure data delivery. Public key cryptography(PKC) has many advantages over Symmetric key cryptography like key management key distribution over insecure channel etc. However, PKC requires a large key size in comparison to SKC to provide same level of security. This makes PKC costly operation and not suitable for the environment like WLAN where limited memory is available for WLAN devices. In recent years, Elliptic Curve Cryptography (ECC) has gained a lot of attention from research communities, because ECC seems to promise simillar or a better level of security with smaller key size in comparison with conventional PKC (e.g. RSA, DSS). These features make them workable under constraint environment. In this thesis, we have studied the security evolution of WLAN 802.11 with Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). We have observed some limitations of WEP and WPA. We, then, present a new protocol using ECC for mutual authentication and session key establishment. We compare our protocol with simillar protocols for wireless security and show that the proposed protocol is efficient w.r.t. space, bandwidth and computational cost at Client side. The security analysis of proposed protocol shows that it may achieve forward secrecy with respect to Client, joint key control, key integrity and resists guessing, replay, impersonantion attacks. A thorough forrmal security analysis is required to be done.
URI: http://drsr.daiict.ac.in/handle/123456789/318
Appears in Collections:M Tech Dissertations

Files in This Item:
File Description SizeFormat 
200911001.pdf
  Restricted Access
349.35 kBAdobe PDFThumbnail
View/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.