Reference Hub2
Identity-Based Encryption Protocol for Privacy and Authentication in Wireless Networks

Identity-Based Encryption Protocol for Privacy and Authentication in Wireless Networks

Clifton Mulkey, Dulal C. Kar
Copyright: © 2014 |Pages: 27
ISBN13: 9781466647893|ISBN10: 1466647892|EISBN13: 9781466647909
DOI: 10.4018/978-1-4666-4789-3.ch009
Cite Chapter Cite Chapter

MLA

Mulkey, Clifton, and Dulal C. Kar. "Identity-Based Encryption Protocol for Privacy and Authentication in Wireless Networks." Network Security Technologies: Design and Applications, edited by Abdelmalek Amine, et al., IGI Global, 2014, pp. 129-155. https://doi.org/10.4018/978-1-4666-4789-3.ch009

APA

Mulkey, C. & Kar, D. C. (2014). Identity-Based Encryption Protocol for Privacy and Authentication in Wireless Networks. In A. Amine, O. Mohamed, & B. Benatallah (Eds.), Network Security Technologies: Design and Applications (pp. 129-155). IGI Global. https://doi.org/10.4018/978-1-4666-4789-3.ch009

Chicago

Mulkey, Clifton, and Dulal C. Kar. "Identity-Based Encryption Protocol for Privacy and Authentication in Wireless Networks." In Network Security Technologies: Design and Applications, edited by Abdelmalek Amine, Otmane Ait Mohamed, and Boualem Benatallah, 129-155. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4789-3.ch009

Export Reference

Mendeley
Favorite

Abstract

Wireless networks are inherently insecure due to the fact that information on the network can be passively retrieved by an eavesdropper using off-the-shelf network hardware and free software applications. The most common solution for this vulnerability is the Wireless Protected Access (WPA) protocol. This protocol provides data encryption and access control for wireless networks. However, the WPA protocol contains drawbacks in its authentication mechanisms that can cause inconveniences for end users and performance degradation for the network. Furthermore, many of the authentication methods used with WPA are not friendly to small and resource-constrained wireless devices. This chapter presents the design of a new wireless security protocol for privacy and authentication using efficient Identity-Based Encryption (IBE) techniques. This protocol can be used to eliminate the need for a central authentication server for enterprise networks, as well as to provide the new feature of privacy without authentication for public wireless networks. This work also puts forth an analysis and validation of the new protocol, including security strength, storage overhead, communication overhead, and computational efficiency.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.