An EAP-EHash authentication method adapted to resource constrained terminals

Abstract : In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Authentication is a crucial concern in resource constrained environments, and despite the great number of existing EAP methods, as explained in the article, we are still in need for EAP methods tightly adapted to wireless environments and satisfying heterogeneity of terminals and their limitations of resources. After a first comparative analysis of existing EAP methods, this article presents a new EAP-EHash method (EHash for Encrypted-Hash) that is adapted to the highly vulnerable wireless environment by supporting mutual authentication, and session key derivation, and offering simplicity, rapidity and easy-to-deploy features. This EAP-EHash was formally proved to satisfy the claimed security properties, thanks to the AVISPA tool. Implementation of it on an 802.11 testbed platform gave realistic authentication delays averaging 26 milliseconds, and thus proved EAP-EHash is competitive to EAP-MD5 that is known to be the simplest of the EAP methods. Features of EAP-EHash include short execution delays and low bandwidth consumption, and as such it appears attractive for wireless.
Document type :
Journal articles
Annals of Telecommunications - annales des télécommunications, Springer, 2009, 65 (5), pp.271 - 284. <10.1007/s12243-009-0135-9>
Liste complète des métadonnées

https://hal.archives-ouvertes.fr/hal-00506549
Contributor : Médiathèque Télécom Sudparis & Télécom Ecole de Management <>
Submitted on : Wednesday, July 28, 2010 - 11:01:39 AM
Last modification on : Thursday, February 9, 2017 - 3:22:01 PM
Document(s) archivé(s) le : Friday, October 29, 2010 - 10:31:30 AM

File

Annales-EAP-EHASH-oct2009.pdf
Files produced by the author(s)

Identifiers

Collections

Citation

Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa. An EAP-EHash authentication method adapted to resource constrained terminals. Annals of Telecommunications - annales des télécommunications, Springer, 2009, 65 (5), pp.271 - 284. <10.1007/s12243-009-0135-9>. <hal-00506549>

Share

Metrics

Record views

266

Document downloads

559