Abstract

We present a fast and efficient way of switching a wireless node (WN) between different Access Points (AP) in an Infrastructure Wireless Network. Our proposed model adheres to the security standards set by IEEE 802.11i draft. New architectures like 802.11i and Robust Secure Network (RSN) mainly depend on the 802.1x communication between a Wireless supplicant node and an Authentication Server (AS) followed by a 4-Way handshake between Wireless Supplicant node and Access Point. Reassociation with another AP also requires a four way handshake. We propose two models for transitions. The first model is based on Distributed approach while the second one is based on Centralized approach. Distributed model involves AP to AP direct communication without the involvement of AS while in Centralized model APs communicate through AS. We show that both the models are very efficient, secure and deny any kind of man in the middle attack, any rogue attack by wireless node or an AP and any kind of Denial of Service attack. Finally, we show that Centralized model has a little edge over the distributed model.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call