An RFID secure authentication mechanism in WLAN

Ming Huang Guo, Horng Twu Liaw, Der Jiunn Deng, Han Chieh Chao

Research output: Contribution to journalArticle

7 Citations (Scopus)

Abstract

With the thriving evolution of information technology, network technology attains to maturity and Wireless Local Area Network (WLAN) becomes universal as well. To discipline the right of network usage, network system identifies users before providing network services or resources. In the historical researches, the conventional authentication mechanisms frequently adopted the names and passwords of users as login authentication. However, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches on authentication are built on Two-Factor Authentication schemes. Nevertheless, the expensive cost of building Two-Factor Authentication approaches has affected the will of users. For the purpose of lifting the rate of usage, in this paper, we apply low-cost passive Radio Frequency Identification (RFID) tag along with the names and passwords of users as login authentication. The analytic comparison indicates the research not only reduces the cost of Two-Factor Authentication schemes, but provides security in the same way as smart cards technology.

Original languageEnglish
Pages (from-to)236-240
Number of pages5
JournalComputer Communications
Volume34
Issue number3
DOIs
Publication statusPublished - 2011 Mar 15

Fingerprint

Wireless local area networks (WLAN)
Radio frequency identification (RFID)
Authentication
Costs
Smart cards
Computer networks
Information technology

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

Guo, Ming Huang ; Liaw, Horng Twu ; Deng, Der Jiunn ; Chao, Han Chieh. / An RFID secure authentication mechanism in WLAN. In: Computer Communications. 2011 ; Vol. 34, No. 3. pp. 236-240.
@article{6e5b69207edd4989bde9d0f558200e88,
title = "An RFID secure authentication mechanism in WLAN",
abstract = "With the thriving evolution of information technology, network technology attains to maturity and Wireless Local Area Network (WLAN) becomes universal as well. To discipline the right of network usage, network system identifies users before providing network services or resources. In the historical researches, the conventional authentication mechanisms frequently adopted the names and passwords of users as login authentication. However, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches on authentication are built on Two-Factor Authentication schemes. Nevertheless, the expensive cost of building Two-Factor Authentication approaches has affected the will of users. For the purpose of lifting the rate of usage, in this paper, we apply low-cost passive Radio Frequency Identification (RFID) tag along with the names and passwords of users as login authentication. The analytic comparison indicates the research not only reduces the cost of Two-Factor Authentication schemes, but provides security in the same way as smart cards technology.",
author = "Guo, {Ming Huang} and Liaw, {Horng Twu} and Deng, {Der Jiunn} and Chao, {Han Chieh}",
year = "2011",
month = "3",
day = "15",
doi = "10.1016/j.comcom.2010.02.033",
language = "English",
volume = "34",
pages = "236--240",
journal = "Computer Communications",
issn = "0140-3664",
publisher = "Elsevier",
number = "3",

}

An RFID secure authentication mechanism in WLAN. / Guo, Ming Huang; Liaw, Horng Twu; Deng, Der Jiunn; Chao, Han Chieh.

In: Computer Communications, Vol. 34, No. 3, 15.03.2011, p. 236-240.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An RFID secure authentication mechanism in WLAN

AU - Guo, Ming Huang

AU - Liaw, Horng Twu

AU - Deng, Der Jiunn

AU - Chao, Han Chieh

PY - 2011/3/15

Y1 - 2011/3/15

N2 - With the thriving evolution of information technology, network technology attains to maturity and Wireless Local Area Network (WLAN) becomes universal as well. To discipline the right of network usage, network system identifies users before providing network services or resources. In the historical researches, the conventional authentication mechanisms frequently adopted the names and passwords of users as login authentication. However, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches on authentication are built on Two-Factor Authentication schemes. Nevertheless, the expensive cost of building Two-Factor Authentication approaches has affected the will of users. For the purpose of lifting the rate of usage, in this paper, we apply low-cost passive Radio Frequency Identification (RFID) tag along with the names and passwords of users as login authentication. The analytic comparison indicates the research not only reduces the cost of Two-Factor Authentication schemes, but provides security in the same way as smart cards technology.

AB - With the thriving evolution of information technology, network technology attains to maturity and Wireless Local Area Network (WLAN) becomes universal as well. To discipline the right of network usage, network system identifies users before providing network services or resources. In the historical researches, the conventional authentication mechanisms frequently adopted the names and passwords of users as login authentication. However, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches on authentication are built on Two-Factor Authentication schemes. Nevertheless, the expensive cost of building Two-Factor Authentication approaches has affected the will of users. For the purpose of lifting the rate of usage, in this paper, we apply low-cost passive Radio Frequency Identification (RFID) tag along with the names and passwords of users as login authentication. The analytic comparison indicates the research not only reduces the cost of Two-Factor Authentication schemes, but provides security in the same way as smart cards technology.

UR - http://www.scopus.com/inward/record.url?scp=78751643768&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78751643768&partnerID=8YFLogxK

U2 - 10.1016/j.comcom.2010.02.033

DO - 10.1016/j.comcom.2010.02.033

M3 - Article

AN - SCOPUS:78751643768

VL - 34

SP - 236

EP - 240

JO - Computer Communications

JF - Computer Communications

SN - 0140-3664

IS - 3

ER -