Skip to main content
Log in

The identity authentication of Wi-Fi system based on network security

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

With the wide distribution of hot spots, in order to facilitate users to access the network at anytime and anywhere, the current network technology has developed a convenient and fast hot spot sharing system and has been popularized in daily life. However, the convenience of the information society also hides network security dangers. The purpose of this paper is to study and analyze the security problems existing in current Wi-Fi sharing applications by designing two different network authentication programs. In this paper, ieeee802.1x protocol is used for wireless access, eap-tls and RADIUS bidirectional authentication mechanism to achieve the authentication of access users, and one-time password authentication technology is used in Fat AP networking mode. Aiming at the defects of S/KEY protocol, such as server impersonation and system crash, an authentication scheme combining DES and RSA algorithm is proposed and implemented. The authentication scheme in network mode retains the advantage of simple operation of static cryptography system. By adding uncertainties, the security of the authentication system can be improved. The encrypted information is used to encrypt the transmitted information to ensure the confidentiality of the information during transmission. After successful authentication, session key negotiation is completed to ensure the security of subsequent communication. This scheme has a success rate of more than 95% after the experiment, is simple in design, high in security, low in cost, and does not need the participation of the third party, which is very suitable for solving the problems of user authentication and communication confidentiality in the shared system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Shin S, Wang H, Gu G (2015) A first step toward network security virtualization: from concept to prototype. IEEE Transact Inform Forens Secur 10(10):2236–2249

    Article  Google Scholar 

  2. Pearce C, Zeadally S (2015) Ancillary impacts of multipath TCP on current and future network security. IEEE Internet Comput 19(5):58–65

    Article  Google Scholar 

  3. Divya R, Vijayalakshmi V (2015) Analysis of multimodal biometric fusion based authentication techniques for network security. Int J Security Appl 9(4):239–246

    Google Scholar 

  4. Li X, Liu J, Ding B, Li Z, Wu H, Wang T (2019) A SDR-based verification platform for 802.11 PHY layer security authentication. World Wide Web, pp. 1-24

  5. Scott-Hayward S, Natarajan S, Sezer S (2015) A survey of security in software defined networks. IEEE Commun Surveys Tutorials 18(1):623–654

    Article  Google Scholar 

  6. He LM, Yan Z, Atiquzzaman M (2018) LTE/LTE-a network security data collection and analysis for security measurement: a survey. IEEE Access, PP(99), PP. 1–1

  7. Silue DS, Wan W, Rizwan M (2016) Research and implementation of time synchronous dynamic password based on sm3 hash algorithm. Open J Appl Sci 6(13):893–902

    Article  Google Scholar 

  8. de Chardon CM, Caruso G, Thomas I (2017) Bicycle sharing system ‘success’ determinants. Transp Res A Policy Pract 100:202–214

    Article  Google Scholar 

  9. Alvarez-Valdes R, Belenguer JM, Benavent E, Bermudez JD, Muñoz F, Vercher E, Verdejo F (2016) Optimizing the level of service quality of a bike-sharing system. Omega 62:163–175

    Article  Google Scholar 

  10. Shao SH, Khreishah A, Ayyash M (2015) Design of a visible-light-communication enhanced WiFi system. Comput Therm Sci 67(2):66–68

    Google Scholar 

  11. Banerjee A, Zosa BM, Allen D (2016) Implementation of an image sharing system significantly reduced repeat computed tomographic imaging in a regional trauma system. J Trauma Acute Care Surg 80(1):51–54

  12. Chen S, Ma X, Nguyen TMTUnderstanding bike trip patterns leveraging bike sharing system open data. Front Comput Sci 11(1):77–81

  13. Song Y, Sung KW, Han Y (2016) Impact of packet arrivals on Wi-fi and cellular system sharing unlicensed spectrum. IEEE Trans Veh Technol 65(12):10204–10208

    Article  Google Scholar 

  14. Singh B, Goel R (2019) MCMC estimation of multi-component load-sharing system model and its application. Iran J Sci Technol Transact A: Sci 43(2):567–577

    Article  MathSciNet  Google Scholar 

  15. Pundir PS, Gupta PK (2018) Reliability estimation in load-sharing system model with application to real data. Ann Data Sci 5(1):69–91

    Article  Google Scholar 

  16. Nguyen NT, Chang CC (2018) Untraceable biometric-based three-party authenticated key exchange for dynamic systems. Peer-to-Peer Network Appl 11(3):644–663

    Article  Google Scholar 

  17. Miao D, Fu J, Lu Y, Li S, Chen CW (2016) A high-fidelity and low-interaction-delay screen sharing system. ACM Transact Multimedia Comput, Commun Appl (TOMM) 12(3):1–23

    Article  Google Scholar 

  18. Nohara A, Shiramatsu S, Ozono T, Shintani T (2015) Developing a mountaineering plan sharing system based on information extraction from unstructured documents. Ieej Transact Electron Inform Syst 135(12):1470–1480

    Google Scholar 

  19. Lu M, Hsu SC, Chen PC, Lee WY (2018) Improving the sustainability of integrated transportation system with bike-sharing: a spatial agent-based approach. Sustain Cities Soc 41:44–51

    Article  Google Scholar 

  20. Majima Y, Maekawa Y, Hirano K, Inotani T, Izumi T, Shimada S, Ishigame A (2018) Video review system for sharing tacit knowledge of clinical nursing practice. Studies Health Technol Inform 250:41–44

    Google Scholar 

  21. Li X, Niu JW, Liao JG (2015) Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 28(2):374–382

    Article  Google Scholar 

  22. Liu ZH, Chen HW (2016) Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad. Chin Phys B 25(8):080308

    Article  Google Scholar 

  23. Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst 40(11):233

    Article  Google Scholar 

  24. Liu HH (2017) The quick radio fingerprint collection method for a WiFi-based indoor positioning system. Mobile Networks Appl 22(1):61–71

    Article  Google Scholar 

  25. Wu Y, Zhang S (2017) Research on indoor wireless access network of hybrid VLC-WiFi System. Semiconduct Optoelectron 38(6):853–856 and 861

    Google Scholar 

  26. Chen Z, Zhou K, Liao Q (2019) Quantum identity authentication scheme of vehicular ad-hoc networks. Int J Theor Phys 58(1):40–57

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hao Tao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tao, H. The identity authentication of Wi-Fi system based on network security. Ann. Telecommun. 76, 313–320 (2021). https://doi.org/10.1007/s12243-020-00793-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-020-00793-0

Keywords

Navigation