• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs

    2015-11-18 10:11:43RajeevSinghandTeekParvalSharma

    Rajeev Singh and Teek Parval Sharma

    Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs

    Rajeev Singh and Teek Parval Sharma

    —Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames. It utilizes the sequence number of the frame along with the authentication stream generators for authentication. Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.

    Index Terms—Per frame authentication, secure authentication, wireless local area networks, wireless security.

    1. Introduction

    Authentication is one of the important defenses in the security of a system. In secure wireless local area networks(WLANs) communication, wireless stations (STAs) and an access point (AP) must authenticate each other’s frames. The per frame authentication (of data frames) involved should also satisfy other requirements of a secure communication, such as maintaining secrecy (encryption),integrity (message integrity code (MIC)), and key refreshing. The existing lightweight authentication mechanisms[1]-[7]do not satisfy the requirements of secure communication. They target only authentication leaving other issues like secrecy, integrity, and key refreshing. For authentication, these mechanisms generally use extra bit(s)which increases the communication overhead.

    The IEEE 802.11i[8]based networks provides necessary security features like authentication, integrity, and confidentiality while ignoring the availability concerns. This makes it susceptible to the Denial of Service (DoS)attacks[9]-[12]. Per frame authentication (for data frame) is implicitly performed via MIC verification. An attacker may utilize this fact to send large number of frames with wrong MIC, engaging the receiver to verify the MICs. MIC verification involves computation time of the order of 0.75 ms[13],[14]and hence may cause DoS attacks (computation DoS), especially against AP. Above all, the key involved in 802.11i for encryption and MIC evaluation is not refreshed for each frame. But the 4-way handshake (involving four data frames) is required every time to evolve a fresh key. As per the mean time for 4-way handshake in IEEE 802.11i is 16.1 ms which is large enough for refreshing key per frame[15].

    In this paper, we intend to separate the authentication and cryptographic functionality (MIC and encryption/ decryption) in the data frames. This helps in protection against computation DoS attacks. Here, the data frame itself provides implicit authentication via its sequence number. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like subtraction and XOR operation. No extra messages or bits per frame are required for authentication, which minimizes the communication overhead. As the scheme does not allow revealing the shared seed values and sequence numbers, it provides a secure authentication mechanism. The scheme prohibits, replays, and maintains the synchronization in case of loss of frames. Thus, the main contribution of the paper is utilization of the sequence number for authentication of data frames in a secure manner.

    The rest of the paper is arranged as follows. Section 2 provides a brief review of the existing solutions that provide per frame authentication in WLANs. Section 3 presents the proposed sequence number based secure authentication scheme along with the property comparisons. Section 4 provides the performance and security analysis. Section 5 draws conclusions.

    2. Related Work

    Researchers have proposed several lightweight per frame authentication schemes[1]-[7]for WLANs. The statistical one bit lightweight authentication protocol(SOLA)[1]provides one bit identity authentication per frame to the authorized communicating party (one with the shared secret key). The use of single bit greatly reduces the communication overhead. SOLA[1]generates the authentication stream based upon the key shared between the communicating parties. The protocol requires one additional bit to be placed in the medium access control(MAC) or Internet protocol (IP) header and one bit indicating the success or failure in the returned acknowledge (ACK) frame. SOLA is vulnerable to DoS attacks and guessing of the identity authentication bit attack(attacker’s chances to guess a single bit are quite high(50%)). To detect these attacks, a failure threshold is kept. A failure threshold value greater than 50% indicates attacks,which calls for resetting the authentication. The synchronization scheme involves increasing the authentication bit stream of both of the sender and receiver to the next opposite bit plus 1 in case of non synchronization. Wang et al. also proposed a one bit lightweight protocol for access control in 802.11 networks[2]. The protocol provides continuous authentication, which is suitable for high mobility wireless networks as the overhead of authentication is little (single bit is used for authentication). In case of non synchronization detected, it takes less time to stabilize, as resynchronization is done only by the sender in its authentication bit stream. The attacker may utilize this fact and can modify or replay the receiver’s response to confuse the sender. This may lead the sender to resynchronize unnecessarily, in the worst case the sender may become busy most of the time. The system also cannot differentiate between the instances when the system is in non synchronization due to the packet loss or due to the attacker utilizing a long authentication stream of 0 or 1. Wang et al. later improvised the synchronization algorithm and came with 3 approaches[3]. These approaches deal with the pointer movement in the authentication bit streams. It also finds statistically the authenticity of the mobile node. These protocols provide only authentication but do not talk about the confidentiality (packet encryption), integrity, and key management. The number of synchronization run in both [2]and [3] varied in accordance to the difference of the distance between the communicating parties’ authentication bit strings. The performances of these schemes decrease with the increase in the number of synchronization runs. It is also possible that the authentication bit stream may lose synchronization itself[4]. An enhancement to Wang’s scheme was done by Ren et al.[4]. It provides a higher probability for attack detection by utilizing more bits (3 bits)for authentication at the MAC layer. It is compatible with the existing frame structure of WLANs. The scheme only detects the attacks by using a statistical method but does not provide any confidentiality, integrity, and key management. For these issues it depends upon higher layer measures (like the Internet protocol security (IPsec) at the network layer). The major drawback in it is the fact that it does not authenticate the ACK frames. An attacker with the false synchronization information (wrong value of counter) in ACK failure can easily fool the sender. The chances that the sender and receiver are non-synchronized and still the 3 bit authentication bits (stuffed by the attacker) are matched are 8-1(0.125). Lee et al. also proposed similar random bit authentication. It considers protection only against DoS attacks conducted via management frames[5]. Out of 8 spoofed packets, the success rate of attacker is again 8-1(0.125).

    The synchronized pseudo random number generation(SPRiNG)[6]is a symmetric key authentication protocol which tries to prevent the replay attacks and avoid key reuse. Both the sender and receiver are synchronized and generate their pseudo random numbers which are used as authenticator variables. These are also utilized as the unique encryption key for each data frame. The SPRiNG synchronization process is prone to DoS attacks. Sufficient number of authentication errors may result in session termination, re-association, and re-establishment of the synchronization counters. DoS can even be conducted by changing the counter values such that it becomes different from that of the receiver. Pseudo random numbers generated in the scheme depend only upon the previous pseudo random number. This can compromise the entire sequence generated hence after. Lee et al. proposed a puzzle based WLAN authentication solution[7]. However, it does not provide frame level authentication of data frames and is prone to DoS attacks. Aslam et al. provided a pseudo randomized sequence number based solution but this pertains only to dissociation frames[16].

    The lightweight authentication schemes discussed, raise the issue of synchronization which is important in the WLANs as packets might get lost or be tampered frequently. The attacker chances are also quite high in these schemes as few number of bits are involved in authentication. Most importantly, most of these do not involve the encryption or protection of the authentication bit streams or data packets. Thus, none of these schemes provide a secure authentication solution. So we propose a per frame secure authentication scheme, which provides secure frame level authentication to data frames.

    3. Proposed Sequence Number Based Secure Authentication Scheme

    The proposed authentication scheme is based upon the generation and verification of authentication sequencenumbers (ASNs) by the sender and receiver. The ASN is derived from the sequence number (inserted in the sequence control field of the frame). The sequence control field (as shown in Fig. 1) is a 16-bit sequence number used to provide sequence control of the frames, i.e., a 12-bit sequence number of the MAC service data unit (MSDU)plus a 4-bit fragment number is used to identify and order the fragments. In the lightweight authentication schemes[1]-[7], the sequence numbers are not fitted for the synchronization purpose as in case of frame retransmission sequence numbers remains the same and do not contribute to any advancement of the authentication stream. Moreover,sequence numbers repeat after some time due to overflow and are sent in clear, they do not meet the intended authentication purpose. In the proposed scheme we assume,the sender and receiver start from a commonly shared sequence number that can start from any chosen value. This sequence number is stored along with the keying material both on the sender and receiver. Thus, AP maintains sequence numbers per STA.

    3.1 Authentication Sequence Number Generation

    The entire process of authentication is shown in Fig. 2. The sender and receiver both share three seed values for the generation of three authentication streams by using the authentication stream generator (ASG). We assume the existence of Diffie-hellman key exchange algorithm for deriving the shared common key. For sharing the seeds, the encryption using the commonly derived Diffie-hellman key is utilized. In case the stronger authentication is required,the 802.1X[17]based or client puzzle based[10]algorithms can be used for initial authentication.

    The authentication streams are numbered as AS1, AS2,and AS3. The sender selects three bits from the first stream(AS1) each time when a new frame is to be sent. Based upon its numeric value (in decimal), the bits from the second bit stream (AS2) are simultaneously selected. The numeric value (in decimal) of these bits is subtracted from the sequence number. We term the value that is obtained after subtracting as the subtracted sequence number. Sixteen bits are now selected from the third stream (AS3)and XORed with the subtracted sequence number. The number obtained hence is termed as the authentication sequence number (ASN). Thus, the third stream is used for providing protection to the subtracted sequence number. The protected authentication sequence number is sent to the receiver to provide per frame authentication. It is sent in the sequence number field of the 802.11 frame header and hence, does not require extra bits or frames for the authentication purpose. The verification of the authentication sequence number by the receiver results in the authentication of the sender for each frame.

    Fig. 1. 802.11 MAC frame format.

    Fig. 2. Proposed sequence number based per frame authentication scheme.

    In Fig. 2, the frame sequence number for frame1 is 2358. The sender selects 3 bits (the value equals 5) from AS1 and then selects 5 bits from AS2 (the value equals 26). It thus,subtracts 26 from the sequence number giving 2332 which is XORed with the 16 bit value selected from AS3 (3414) to give the authentication sequence number as 1098. Hence,the sender puts 1098 in the sequence control field of the frame header and sends the frame.

    For ACK, the sequence number is 2359. The sender selects 3 bits (the value is equal to 6) from AS1 and then selects 6 bits from AS2 (the value is equal to 61). It thus,subtracts 61 from the sequence number resulting in 2298 which is XORed with the 16 bit value selected from AS3(3550) to give the authentication sequence number as 1316. Hence, 1316 is put in the sequence control field of the frame header. Similarly, ASN for the next data frame is calculated (as 2796). The strength of the scheme lies in the fact that any two authentication sequence numbers (here,1098, 1316, and 2796) are not related with each other while hiding the original sequence numbers (here, 2358, 2359,and 2360) of the frames.

    3.2 Verification at the Receiver

    On receipt of a frame, the receiver generates the authentication sequence number. The receiver matches the generated and received authentication sequence numbers to authenticate the sender. Upon authentication, the message integrity code (MIC) is checked. After its successful verification, the receiver decrypts the frame (if it is encrypted) and returns the ACK with the next ASN. Thus,the ACK is also protected and authenticated, which makes the scheme robust against attacks that are targeted against the ACK.

    For the case of bulk transfer, i.e. more than one frame transfers in a time interval by the sender, we assume that the upper limit on the number of frames to be transmitted in bulk in a session is negotiated at the time of association. The receiver counts the number of such frames received within a fixed time interval. It then calculates the equal number of authentication sequence numbers. Now instead of matching with one, the receiver has to match with all the authentication sequence numbers of frames received in bulk. After the verification of all the frames, ACK is returned with the current ASN. The frames of the attacker will fail in verification and are hence dropped.

    3.3 Synchronization Issues

    No synchronization is required under the single frame transfer case, as the next frame is transferred only after the receipt of the ACK. Synchronization is required under bulk frame transfer. The sender and receiver may lose synchronization due to the loss of data frames or due to the loss of ACK frames. In case of losing data frames, the receiver sends the ACK with ASN (corresponding to the latest sequence number till where frames were received properly) and supporting ASN. The ASN will obviously be a repeated one and it indicates the data frame loss to the sender. The receiver selects a random number (rn), adds it to the numeric value of AS2 in the calculation, and obtains corresponding ASN (supporting ASN). The selected random number (16 bits) is also sent in the ACK. On noticing the duplicate ASN in the ACK, the sender authenticates the receiver via verifying the supporting ASN. For frame retransmission, the sender selects a random number (rs). The sender adds this number to AS2 and then calculates the ASNs for the retransmission of the frames. The newly calculated ASN and rsare sent in the corresponding data frame to the receiver. On receipt, the receiver verifies the ASN with the help of rs.

    If the ACK frame is itself lost, the sender sends the frames again by shifting the pointer in the authentication stream to the place where the last ACK was received correctly. As all the data frames were previously received correctly at the receiver, the receiver sends the previous ACK (lost ACK) with ASN again, ensuring the lost synchronization. Thus, for synchronizing the bulk transfer,buffering of frames and corresponding ASNs at the sender and receiver are required.

    3.4 Security Issues

    The encryption of the data frames is done by using the existing secure symmetric key mechanisms like the temporal key integrity protocol (TKIP) or the advanced encryption standard (AES) in the counter mode. The current sequence number is XORed with the key and the resultant is used as the encryption key. As the current sequence number is increased for each frame, the encryption key is refreshed for each frame. For maintaining MIC, AES in the cipher block chaining message authentication code (CBC-MAC) protocol (CCMP) is utilized. MIC is evaluated by using the newly refreshed key. The refreshed key in the proposed scheme is neither exposed nor vulnerable to the attacks.

    3.5 Implementation Issues

    The authentication sequence numbers are put in the sequence control field of the MAC header. This prevents the use of extra bits or frames for the authentication purpose and hence makes the scheme lightweight in terms of communication overhead. The data is sent and encrypted in the frame body as payload. It is encrypted by using the refreshed key. The ASN, supporting ASN, and selected random number are added in the MAC header of the ACK frame. This helps the two communication parties under non-synchronization to synchronize. This overhead (48 bits)is justified, as the ACK frame has a small size. If thefragmentation is used then, all calculations pertaining to ASN will be performed by using 12 bits only (i.e. the size of the sequence numbers and the size of AS3 will be equal to 12 bits in this case) and the remaining 4 bits of the sequence control field will indicate the fragment number. In the current work, we consider ASN in the size of 16 bits.

    3.6 Feature Comparison with Related Solutions

    Feature comparisons of the proposed scheme with per frame authentication solutions and related security protocols are shown in Table 1. The proposed scheme provides strong and continuous authentication. It involves initial message exchanges for key exchange and seed sharing. It also enjoys high confidentiality based upon existing symmetric encryption mechanisms. The message integrity is maintained by using MIC. The scheme provide secure authentication and has the synchronization mechanism. It also maintains key freshness per frame without exchanging any extra messages.

    Table 1: Feature comparisons of the proposed scheme with per frame authentication solutions and related security protocols

    4. Analysis of Proposed Scheme

    The proposed scheme is a secure authentication scheme which provides per frame authentication and does not use any third party like authentication server (AS) in the authentication process. The security of the scheme lies in the security of the seed values and sequence number. The ACK frames are also protected and authenticated, which provides extra strength to the scheme. It is difficult to provide the authentication to management frames before the shared key is exchanged. But once the key is exchanged,the proposed ASN method can also be utilized to provide authentication to management frames. MIC calculations,data encryption, and key refreshing are ignored for management frames.

    4.1 Performance Analysis

    The proposed scheme requires memories for storing the seeds, sequence number, shared key, and authentication stream. In case of bulk transfer, the storage of the frames along with ASNs is also required. Thus, the scheme has nominal memory requirements. The scheme has no extra communication overhead (Table 2) during authentication as no extra bits and frames are involved. And 48 bits per ACK frame are required for synchronization purpose.

    For calculating the computation overhead, let TKeyrefresh,TEnc, TIntegrity, TASG, and TRandombe the time complexity for key refreshing, encryption/decryption, integrity (CRC/MIC),authentication stream generation, and random number generation, respectively. Typically, time complexity associated with these operations can be roughly expressed as TASG<TRandom<TKeyrefresh<TIntegrityand TEnc. Our scheme requires computations for encryption/decryption (TEnc),finding MIC (TIntegrity), and generating authentication sequence number (TASG). It is obvious that the computational performance of the first five authentication schemes[1]-[5]is better than the remaining schemes in Table 2. This is due to the fact that no MIC is used and no encryption is performed in these schemes. The encryption and MIC provide security features and hence extra computations in our scheme are justified. If we compare only the computational cost for authentication, we find that our scheme performance is equivalent to others. For finding the computational cost for authentication, we recorded the time by using a C program to generate authentication sequence number on a machine running under Ubuntu with a core2duo processor (2.66 GHz) and 1 GB RAM. The time taken is of the order of 0.5 ms. This justifies that it is lightweight authentication.

    4.2 Security Analysis

    Comparisons of existing approaches with our scheme from the perspective of security properties, like brute force attacks, modification, man-in-middle, replay, and availability (DoS), are given in Table 3. The comparisons clearly indicate that the proposed scheme provides the security almost equivalent to 802.11i. The security of the scheme lies in the fact that it is difficult to guess and calculate the sequence numbers used during the authentication. For finding the sequence number, the attacker will have to first decode the communicated authentication sequence number. For decoding, the attacker must know the corresponding AS1, AS2, and AS3 values.The attacker does not have seed values, so he cannot evaluate AS1, AS2 and AS3 values. He can apply the brute force method for finding the ASN. The probability of guessing all 16 bits correctly is 2-16, i.e. 0.000015. And this will only lead to authentication of one frame only and do not affect the entire scheme.

    Table 2: Performance comparison of our scheme with other security solutions

    Message modification or insertion attacks are not possible due to the fact that the ASN cannot be generated by the attacker as he lacks the necessary information for it. MIC of the message is evaluated by using the sequence number (refreshed key). This binds the message and the authentication sequence number since which message modification or insertion is not possible.

    Man-in-middle attacks are impossibilities as the attacker does not have the access to the seed values and sequence number. Moreover, the message is protected by using encryption and MIC. Replay attacks cannot be carried out as the scheme is robust under the duplicate frame and replayed frames. A data frame with unknown ASN or a frame with duplicate ASN is silently dropped at the receiver. Thus, the acceptance of the replayed frame that is already authenticated previously is not possible here as such frame will be discarded immediately at the receiver due to the failure of authentication sequence number verification.

    DoS attacks are impossible as every frame including the ACK frame is authenticated. The attacker frames lack the ASN and hence are dropped at the receiver. The DoS attack conducted via wrong MIC is not effective as the scheme separates the authentication from the integrity check. CPU exhaustion is not necessary to consider as the verification of the ASN takes very less time. We recorded the time using a C program to generate the authentication sequence number on a machine running under Ubuntu with a core2duo processor (2.66 GHz) and 1 GB RAM. It is of the order of 0.5 ms. For conducting a DoS attack against such a machine, an attacker needs to keep the processor busy all the time. For conducting an attack for one second,an attacker needs to send at least 2 million frames(1/(0.5×10-6)=2×106) per second. An attacker machine flooding at such a high rate can easily be identified and necessary actions can be taken.

    Also as memories occupied by ASN are not large, no memory exhaustion DoS is possible. For the case of bulk transfer, frames that fail to match the calculated authentication sequence numbers are dropped by default,preventing the attack. Thus, the DoS attack is made ineffective by the proposed authentication scheme.

    Table 3: Comparison of our scheme with other security solutions under attacks

    The proposed scheme satisfies an important security property that the two authentication sequence numbers are not related with each other, i.e., the frames with the same sequence number and different authentication sequence numbers are obtained. For example, if the frames have the same sequence number (this possibility increases when the sequence numbers overflow and rotate through the same value) then the 3 bit values selected from AS1 may be different, leading to the selection of different numbers of bits and hence, different values from AS2. Also the 16 bit sequence taken from AS3 will be different. Thus, no correlation between any two authentication sequencenumbers is obtained, i.e., they are not related in any sense with each other.

    Assuming the number of bits selected from ASG2, d, is 3, then the probability that the same authentication sequence number is generated by our scheme is equal to

    (Probability that same sequence number is selected)×(Probability that same value from ASG1 is selected)×(Probability that same value from ASG2 is selected)×(Probability that same value from ASG3 is selected)

    =(1/216)×(1/23)×(1/2d)×(1/216)

    =1/238

    =3.638×10-12

    which is too low in view of the fact that it is per frame authentication. In other words, this means that the possibility that the same authentication sequence number will be generated is one out of 274877906944. Thus, it is justified to consider that a unique authentication sequence number can be generated for each sequence number.

    The length of bits selected from AS2 is varied so that the person who gains the access to seed2 is still unable to find the value of the number selected for the subtraction purpose. Thus a person requires both the seed values for cracking the entire authentication mechanism. And eavesdropping is not possible as the frames are encrypted by using the refreshed key. The attack by malicious AP is not effective as malicious AP lacks the authentication sequence numbers.

    5. Conclusions

    We propose a symmetric key based secure WLAN communication scheme. The scheme utilizes a sequence number based authentication method to provide security per frame. To show the effectiveness of the scheme, we provide the property comparisons, performance analysis, and security analysis between the proposed scheme and the existing related WLAN authentication solutions. The performance analysis shows that our scheme is efficient in authentication, and the security analysis shows that it enjoys almost equivalent security as compared with 802.11i. In comparisons with other per frame and related authentication solutions, it is equivalently efficient and enjoys more security.

    [1] H. Johnson, A. Nilsson, J. Fu, S.-F. Wu, A. Chen, and H. Huang, “SOLA: A one bit identity authentication protocol for access control in IEEE 802.11,” in Proc. of IEEE Global Telecommns Conf., 2002, pp. 768-772.

    [2] H. Wang, A. Velayutham, and Y. Guan, “A lightweight authentication protocol for access control in IEEE 802.11,”in Proc. of IEEE Global Telecommns Conf., 2003, pp. 1384-1388.

    [3] H. Wang, J. Cardo, and Y. Guan, “Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs,” Computer Communications, vol. 28, no. 14,pp. 1618-1630, 2005.

    [4] K. Ren, H. Lee, J. Park, and K. Kim, “An enhanced lightweight authentication protocol for access control in wireless LANs,” in Proc. of the 4th Int. Conf. on Networks,Daejeon, 2004, pp. 444-450.

    [5] Y-S. Lee, H-T. Chien, and W-N. Tsai, “Using random bit authentication to defend IEEE 802.11 DoS attacks,” Journal of Information Science and Engineering, vol. 25, no. 5, pp. 1485-1500, 2009.

    [6] D. L. Pepyne, Y. C. Ho, and Q. Zheng, “SPRiNG: synchronized random numbers for wireless security,” in Proc. of IEEE Wireless Communications and Networking,2003, pp. 2027-2032.

    [7] I. Lee and R. Hunt, “A novel design and implementation of Dos resistant authentication and seamless handoff scheme for enterprise WLANs,” in Proc. of Australian Information Secuity Management, Perth, 2010, pp. 49-61.

    [8] IEEE 802.11i, Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements, IEEE Standard,2004.

    [9] C. He and J. C. Mitchell, “Security analysis and improvements for IEEE 802.11i,” in Proc. of the Annual Network and Distributed System Security Symposium, 2005,pp. 90-110.

    [10] C. S. Park, “Two-way handshake protocol for improved security in IEEE 802.11 wireless LANs,” Elseνier Journal Computer Communications, vol. 33, no. 9, pp. 1133-1140,2010.

    [11] F. D. Rango, D. C. Lentini, and S. Marano, “Static and dynamic 4-Way handshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802.11i,”Journal on Wireless Communication and Network,doi:10.1155/WCN/2006/47453

    [12] L. Wang and B. Srinivasan, “Analysis and improvements over DoS attacks against IEEE 802.11i standard,” in Proc. of IEEE Int. Conf. on Network Security, Wireless Communications, and Trusted Computing, 2010, pp. 109-113.

    [13] I. Martinovic, F. A. Zdarsky, A. Bachorek, and J. B. Schmitt,“Measurement and analysis of handover latencies in IEEE 802.11i secured networks,” in Proc. of the European Wireless Conf., Paris, 2007, pp. 1-7.

    [14] I. Martinovic, F. A. Zdarsky, A. Bachorek, and J. B. Schmitt,Introduction of IEEE 802.11i and Measuring its Security νs. Performance Tradeoff Technical Report 351/06, University of Kaiserslautern, 2006.

    [15] I. Martinovic, F. A. Zdarsky, and J. B. Schmitt, “On the way to IEEE 802.11 DoS resilience,” in Proc. of IFIP Networking 2006, Workshop on Security and Priνacy inMobile and Wireless Networking, Coimbra, 2006, pp. 1-15.

    [16] B. Aslam, M. H. Islam, and S. A. Khan. “Pseudo randomized sequence number based solution to 802.11 disassociation denial of service attack,” in Proc. of Mobile Computing and Wireless Communication Int. Conf., Amman,2006, pp. 215-220.

    [17] IEEE Standard for Local and Metropolitan Area Networks—Port-Based Network Access Control, IEEE Standard 802.1X-2001.

    Rajeev Singh received his M.Tech. degree in computer science & engineering from Indian Institute of Technology, Roorkee, India in 2008 and his Ph.D. degree from National Institute of Technology, Hamirpur, India in 2014. Currently, he is working as an assistant professor with the Department of Computer Engineering, Govind Ballabh Pant University of Agriculture & Technology, Uttarakhand, India. His research interest includes computer networks and network security.

    Teek Parval Sharma received his Ph.D degree from Indian Institute of Technology,Roorkee, India in 2009 in the area of wireless sensor networks. He is an associate professor with the National Institute of Technology,Hamirpur, India. He has published numerous high quality research papers in international/ national journals and conferences, and has also contributed in various books of international publishers. His research interest includes distributed systems, wireless sensor networks, mobile Ad hoc networks, and wireless networks.

    Manuscript received June 25, 2014; revised March 7, 2015.

    R. Singh is with the Department of Computer Engineering, Govind Ballabh Pant University of Agriculture & Technology, Pantnagar 263145,India (Corresponding author e-mail: rajeevpec@gmail.com).

    T. P. Singh is with the Department of Computer Science and Engineering, National Institute of Technology, Hamirpur 177005, India(e-mail: teekparval@gmail.com).

    Digital Object Identifier: 10.3969/j.issn.1674-862X.2015.02.011

    中国美女看黄片| 日本黄大片高清| 成人精品一区二区免费| 人妻丰满熟妇av一区二区三区| 国产aⅴ精品一区二区三区波| 内地一区二区视频在线| 99久国产av精品| 97超级碰碰碰精品色视频在线观看| 一级作爱视频免费观看| 精品欧美国产一区二区三| 一区二区三区免费毛片| 国模一区二区三区四区视频| 欧美成人一区二区免费高清观看| 两个人视频免费观看高清| 听说在线观看完整版免费高清| 国产一区二区亚洲精品在线观看| 成年女人永久免费观看视频| 久久久精品欧美日韩精品| 久久99热6这里只有精品| 婷婷精品国产亚洲av在线| 午夜福利在线在线| 嫩草影视91久久| 日本与韩国留学比较| 欧美日本亚洲视频在线播放| 国产野战对白在线观看| 亚洲国产精品sss在线观看| avwww免费| 天堂动漫精品| АⅤ资源中文在线天堂| 亚州av有码| 精品乱码久久久久久99久播| 亚洲av美国av| 黄片小视频在线播放| 丰满人妻一区二区三区视频av| 欧美精品国产亚洲| 一二三四社区在线视频社区8| 精品午夜福利在线看| 亚洲内射少妇av| 亚洲自偷自拍三级| 久久久久久久久久黄片| 欧美精品国产亚洲| 免费大片18禁| 丝袜美腿在线中文| 日韩欧美精品免费久久 | 国产激情偷乱视频一区二区| 午夜免费男女啪啪视频观看 | 最近最新免费中文字幕在线| 日日干狠狠操夜夜爽| 久久午夜亚洲精品久久| 成人av在线播放网站| 成人性生交大片免费视频hd| 久99久视频精品免费| 少妇人妻精品综合一区二区 | 两个人视频免费观看高清| 毛片一级片免费看久久久久 | 一a级毛片在线观看| 亚洲片人在线观看| 久久中文看片网| 精品久久国产蜜桃| АⅤ资源中文在线天堂| 久久久精品欧美日韩精品| 最近中文字幕高清免费大全6 | 深夜a级毛片| 国产高潮美女av| 老熟妇仑乱视频hdxx| 大型黄色视频在线免费观看| 国产真实伦视频高清在线观看 | 久久精品久久久久久噜噜老黄 | 欧美激情国产日韩精品一区| 成人国产综合亚洲| 全区人妻精品视频| 国产高清视频在线播放一区| av中文乱码字幕在线| 国产主播在线观看一区二区| 国产精品一及| 少妇的逼好多水| 免费大片18禁| 午夜精品久久久久久毛片777| 国产亚洲欧美98| 别揉我奶头 嗯啊视频| 高潮久久久久久久久久久不卡| 免费av观看视频| 老熟妇乱子伦视频在线观看| 欧美一区二区精品小视频在线| 久久国产乱子伦精品免费另类| 精品一区二区免费观看| 国产av不卡久久| 少妇裸体淫交视频免费看高清| 一个人观看的视频www高清免费观看| 麻豆成人午夜福利视频| 性欧美人与动物交配| 观看免费一级毛片| 中文字幕av在线有码专区| 国产伦一二天堂av在线观看| 亚洲中文字幕日韩| 亚洲精品在线观看二区| 丰满的人妻完整版| 亚洲无线在线观看| 欧美zozozo另类| 在现免费观看毛片| 久久99热6这里只有精品| 一本久久中文字幕| 97超级碰碰碰精品色视频在线观看| 亚洲人成网站在线播| 国产色婷婷99| 国产探花极品一区二区| 国产视频一区二区在线看| 亚洲av成人不卡在线观看播放网| 搡老岳熟女国产| 少妇的逼好多水| 欧美zozozo另类| 日本撒尿小便嘘嘘汇集6| 精品人妻一区二区三区麻豆 | 91麻豆精品激情在线观看国产| 午夜福利免费观看在线| 久久午夜福利片| 无人区码免费观看不卡| 久久伊人香网站| 国产午夜精品论理片| 亚洲成人免费电影在线观看| 村上凉子中文字幕在线| 精品午夜福利在线看| 91在线精品国自产拍蜜月| 热99re8久久精品国产| 久久伊人香网站| 欧美+日韩+精品| 一区二区三区激情视频| 少妇被粗大猛烈的视频| 变态另类丝袜制服| 日本免费a在线| 久久久色成人| 亚洲欧美精品综合久久99| 国产在线精品亚洲第一网站| 午夜免费男女啪啪视频观看 | x7x7x7水蜜桃| 高清在线国产一区| 一本综合久久免费| 日本黄色视频三级网站网址| 2021天堂中文幕一二区在线观| 久久精品夜夜夜夜夜久久蜜豆| 露出奶头的视频| 午夜免费激情av| 色视频www国产| 观看免费一级毛片| 老司机深夜福利视频在线观看| 日韩中文字幕欧美一区二区| 无遮挡黄片免费观看| www.999成人在线观看| 欧美性感艳星| 久久午夜亚洲精品久久| 久久草成人影院| 看黄色毛片网站| 精品国产亚洲在线| 五月伊人婷婷丁香| 欧美日韩中文字幕国产精品一区二区三区| 中国美女看黄片| 国产精品久久久久久久久免 | 亚洲中文字幕日韩| 精品久久久久久,| 亚洲av成人av| 欧美一区二区亚洲| 久久午夜亚洲精品久久| 欧美极品一区二区三区四区| 美女被艹到高潮喷水动态| 伊人久久精品亚洲午夜| 国内精品美女久久久久久| av天堂在线播放| 亚洲18禁久久av| 亚洲精品久久国产高清桃花| 国产精华一区二区三区| 久久草成人影院| 韩国av一区二区三区四区| 久久人人精品亚洲av| 美女xxoo啪啪120秒动态图 | h日本视频在线播放| 日韩精品青青久久久久久| 一a级毛片在线观看| 亚洲av日韩精品久久久久久密| 亚洲国产精品成人综合色| 能在线免费观看的黄片| 亚洲第一电影网av| 午夜日韩欧美国产| 99视频精品全部免费 在线| 国产野战对白在线观看| 亚洲精品色激情综合| 一区二区三区四区激情视频 | 亚洲最大成人av| 亚洲av第一区精品v没综合| 午夜福利视频1000在线观看| 成人午夜高清在线视频| 日韩欧美精品免费久久 | 成人精品一区二区免费| 欧美日韩综合久久久久久 | 亚洲va日本ⅴa欧美va伊人久久| 亚洲欧美日韩无卡精品| 国产精品日韩av在线免费观看| a在线观看视频网站| 桃色一区二区三区在线观看| 国产色爽女视频免费观看| 国产精品国产高清国产av| 午夜影院日韩av| 国产一区二区激情短视频| 国产成人影院久久av| 精品久久久久久成人av| 久久久久久久久中文| 1000部很黄的大片| 国产欧美日韩一区二区三| av视频在线观看入口| 日韩av在线大香蕉| 欧美成狂野欧美在线观看| 级片在线观看| 国产精品乱码一区二三区的特点| 久久热精品热| 男女床上黄色一级片免费看| 两个人视频免费观看高清| 欧美日韩福利视频一区二区| 亚洲在线自拍视频| 免费无遮挡裸体视频| 午夜免费成人在线视频| 久久久久久国产a免费观看| 男人的好看免费观看在线视频| 美女高潮的动态| 午夜日韩欧美国产| 三级国产精品欧美在线观看| 香蕉av资源在线| 69av精品久久久久久| 一级黄片播放器| 免费在线观看日本一区| 波野结衣二区三区在线| 午夜福利18| 午夜福利免费观看在线| 国产精品美女特级片免费视频播放器| 国产在线精品亚洲第一网站| 又黄又爽又免费观看的视频| 亚洲国产精品sss在线观看| 国产精品自产拍在线观看55亚洲| 中国美女看黄片| 精品99又大又爽又粗少妇毛片 | 国产精品不卡视频一区二区 | 99精品久久久久人妻精品| 亚洲av成人精品一区久久| 波野结衣二区三区在线| 成人三级黄色视频| 欧美性猛交╳xxx乱大交人| 少妇人妻精品综合一区二区 | 女人被狂操c到高潮| 在线播放无遮挡| 亚洲精品亚洲一区二区| 国产国拍精品亚洲av在线观看| 久久久久国内视频| 亚洲av电影不卡..在线观看| 国产在线男女| 亚洲成人久久性| 精品乱码久久久久久99久播| 18美女黄网站色大片免费观看| 中文字幕免费在线视频6| 老司机深夜福利视频在线观看| 精品久久久久久久久亚洲 | 偷拍熟女少妇极品色| 日韩av在线大香蕉| 直男gayav资源| 在线观看66精品国产| 亚洲自偷自拍三级| 国产精品嫩草影院av在线观看 | 午夜福利视频1000在线观看| 久久精品国产99精品国产亚洲性色| 欧美日本视频| 12—13女人毛片做爰片一| 女生性感内裤真人,穿戴方法视频| 国产成人影院久久av| 日韩欧美国产在线观看| 99视频精品全部免费 在线| 十八禁网站免费在线| 亚洲欧美日韩高清专用| 久久伊人香网站| 女同久久另类99精品国产91| 免费电影在线观看免费观看| 国模一区二区三区四区视频| 一本精品99久久精品77| 网址你懂的国产日韩在线| 免费av毛片视频| 18美女黄网站色大片免费观看| 直男gayav资源| 亚洲第一区二区三区不卡| 久久久久久久午夜电影| 老司机午夜十八禁免费视频| 国产免费男女视频| 午夜a级毛片| 久久久久国内视频| 国产探花在线观看一区二区| 日本黄大片高清| 久久久久久大精品| 日本撒尿小便嘘嘘汇集6| 91九色精品人成在线观看| 亚洲国产精品999在线| 69av精品久久久久久| 国产又黄又爽又无遮挡在线| 亚洲色图av天堂| 黄片小视频在线播放| 亚洲欧美日韩高清专用| 国产精品电影一区二区三区| 亚洲精品在线美女| 88av欧美| 国内毛片毛片毛片毛片毛片| 亚洲成a人片在线一区二区| 国产精品人妻久久久久久| 亚洲av成人不卡在线观看播放网| 亚洲自偷自拍三级| 51午夜福利影视在线观看| 欧美另类亚洲清纯唯美| 人妻丰满熟妇av一区二区三区| 亚洲 欧美 日韩 在线 免费| 少妇的逼好多水| 亚洲成a人片在线一区二区| 熟妇人妻久久中文字幕3abv| 美女大奶头视频| 色播亚洲综合网| 99久久成人亚洲精品观看| 不卡一级毛片| 成人特级av手机在线观看| 两人在一起打扑克的视频| 亚洲va日本ⅴa欧美va伊人久久| 久久这里只有精品中国| 久久午夜福利片| 中文字幕久久专区| 神马国产精品三级电影在线观看| 日本免费a在线| 日本三级黄在线观看| 午夜两性在线视频| 久久人人爽人人爽人人片va | 欧美最新免费一区二区三区 | 中文字幕熟女人妻在线| 99久国产av精品| 中文亚洲av片在线观看爽| 长腿黑丝高跟| 亚洲一区高清亚洲精品| 一个人看的www免费观看视频| АⅤ资源中文在线天堂| 老司机午夜十八禁免费视频| 久久久久国产精品人妻aⅴ院| 热99在线观看视频| 毛片女人毛片| 精品国内亚洲2022精品成人| 村上凉子中文字幕在线| 成人无遮挡网站| 波多野结衣巨乳人妻| 久久国产乱子免费精品| 国模一区二区三区四区视频| 日韩大尺度精品在线看网址| 自拍偷自拍亚洲精品老妇| 51午夜福利影视在线观看| 国产精品一区二区免费欧美| 久久久久亚洲av毛片大全| 女人十人毛片免费观看3o分钟| 99热这里只有是精品50| 亚洲av成人不卡在线观看播放网| 观看美女的网站| 黄色丝袜av网址大全| 成人国产一区最新在线观看| 久久久久久久精品吃奶| 欧美一级a爱片免费观看看| 午夜影院日韩av| 亚洲五月婷婷丁香| 精品久久久久久久人妻蜜臀av| 五月伊人婷婷丁香| 青草久久国产| 国产精品电影一区二区三区| 变态另类成人亚洲欧美熟女| 欧美又色又爽又黄视频| 国产伦精品一区二区三区视频9| 国产一区二区在线av高清观看| 久久久久九九精品影院| 老司机福利观看| 在线播放无遮挡| 91九色精品人成在线观看| 午夜福利在线观看免费完整高清在 | 国产精品一区二区免费欧美| 好男人电影高清在线观看| 性插视频无遮挡在线免费观看| 免费人成在线观看视频色| 亚洲国产精品sss在线观看| 亚洲av免费高清在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 久久精品国产清高在天天线| 亚洲国产色片| 亚洲欧美日韩东京热| 欧美精品国产亚洲| 老司机午夜福利在线观看视频| 在线a可以看的网站| 天堂√8在线中文| 性欧美人与动物交配| 亚洲电影在线观看av| 我要搜黄色片| 观看免费一级毛片| 免费看a级黄色片| 久久天躁狠狠躁夜夜2o2o| 成人精品一区二区免费| 草草在线视频免费看| 久久久国产成人免费| 欧美激情国产日韩精品一区| 婷婷精品国产亚洲av在线| 极品教师在线免费播放| 老司机午夜福利在线观看视频| 中文字幕免费在线视频6| 听说在线观看完整版免费高清| 国产亚洲精品久久久com| 日韩欧美在线二视频| 精品一区二区三区av网在线观看| 亚洲国产精品合色在线| 色在线成人网| 色精品久久人妻99蜜桃| 亚洲美女搞黄在线观看 | 色噜噜av男人的天堂激情| 亚洲18禁久久av| 国产精品爽爽va在线观看网站| 亚洲av日韩精品久久久久久密| 久久久久九九精品影院| 男女那种视频在线观看| 亚洲 国产 在线| 日本免费a在线| 校园春色视频在线观看| 在线天堂最新版资源| 免费高清视频大片| 日韩 亚洲 欧美在线| 一本综合久久免费| 欧美bdsm另类| 免费人成视频x8x8入口观看| 国产午夜精品论理片| 熟女电影av网| 99久久成人亚洲精品观看| 少妇高潮的动态图| av中文乱码字幕在线| 国产一区二区三区在线臀色熟女| 美女cb高潮喷水在线观看| 亚洲在线自拍视频| 大型黄色视频在线免费观看| 淫秽高清视频在线观看| 欧美成人免费av一区二区三区| 三级男女做爰猛烈吃奶摸视频| 亚洲国产欧美人成| 久久人妻av系列| 亚洲美女黄片视频| 在线观看午夜福利视频| 成人美女网站在线观看视频| 亚洲精品色激情综合| 国产高清三级在线| 欧美精品国产亚洲| 亚洲中文日韩欧美视频| 天美传媒精品一区二区| 国语自产精品视频在线第100页| 久久天躁狠狠躁夜夜2o2o| 国产亚洲精品久久久久久毛片| 久久九九热精品免费| 久久热精品热| 久久久久性生活片| 一级a爱片免费观看的视频| 亚洲avbb在线观看| 丰满人妻一区二区三区视频av| 国内精品久久久久精免费| 十八禁网站免费在线| 99久久精品一区二区三区| 91av网一区二区| 男人狂女人下面高潮的视频| 中文字幕人成人乱码亚洲影| 日韩欧美国产在线观看| 亚洲内射少妇av| 欧美高清成人免费视频www| 国产黄色小视频在线观看| 人妻制服诱惑在线中文字幕| 亚洲精品久久国产高清桃花| 1000部很黄的大片| xxxwww97欧美| 国产免费av片在线观看野外av| 日本一本二区三区精品| 亚洲av日韩精品久久久久久密| 久久精品国产亚洲av涩爱 | 国产伦在线观看视频一区| 夜夜爽天天搞| 永久网站在线| 免费在线观看亚洲国产| 搡女人真爽免费视频火全软件 | 男人的好看免费观看在线视频| 人妻夜夜爽99麻豆av| 欧美色欧美亚洲另类二区| 国内揄拍国产精品人妻在线| 亚洲人成网站高清观看| 国产精品久久久久久精品电影| 国产v大片淫在线免费观看| 国产乱人视频| 免费av毛片视频| 俄罗斯特黄特色一大片| 中文字幕免费在线视频6| 久久精品人妻少妇| 一个人免费在线观看电影| 小蜜桃在线观看免费完整版高清| 我的女老师完整版在线观看| 国产日本99.免费观看| 国产一级毛片七仙女欲春2| 噜噜噜噜噜久久久久久91| 真实男女啪啪啪动态图| 久久精品国产自在天天线| 精品人妻熟女av久视频| 亚洲av二区三区四区| 日本免费a在线| a级一级毛片免费在线观看| 亚洲av美国av| 国产aⅴ精品一区二区三区波| 亚洲真实伦在线观看| 成人av在线播放网站| 精品一区二区三区视频在线观看免费| 久久人人爽人人爽人人片va | 观看免费一级毛片| 日韩成人在线观看一区二区三区| 18美女黄网站色大片免费观看| 免费一级毛片在线播放高清视频| 日韩欧美三级三区| 久久精品国产亚洲av天美| 国产男靠女视频免费网站| 亚洲人成电影免费在线| 一区二区三区激情视频| 超碰av人人做人人爽久久| 赤兔流量卡办理| 少妇的逼好多水| 国产成人a区在线观看| 少妇被粗大猛烈的视频| 午夜激情欧美在线| 亚洲第一区二区三区不卡| 免费人成视频x8x8入口观看| 18+在线观看网站| 色在线成人网| 国产精品美女特级片免费视频播放器| 欧美日本视频| 亚洲av成人av| 又爽又黄a免费视频| 午夜a级毛片| 国内精品久久久久久久电影| 身体一侧抽搐| 男人的好看免费观看在线视频| 在线观看免费视频日本深夜| 欧美一区二区亚洲| 久久久久精品国产欧美久久久| 淫妇啪啪啪对白视频| 午夜福利18| 最近在线观看免费完整版| 人妻制服诱惑在线中文字幕| 国产高清视频在线观看网站| 亚洲avbb在线观看| 日韩欧美国产一区二区入口| 一区二区三区免费毛片| 亚洲va日本ⅴa欧美va伊人久久| 九九热线精品视视频播放| 别揉我奶头 嗯啊视频| 日韩欧美精品v在线| 美女 人体艺术 gogo| 我的老师免费观看完整版| 好男人在线观看高清免费视频| 日本黄色视频三级网站网址| 日韩欧美精品免费久久 | 色av中文字幕| 亚洲成人精品中文字幕电影| 热99re8久久精品国产| 动漫黄色视频在线观看| 日本一二三区视频观看| 欧美又色又爽又黄视频| 99久久成人亚洲精品观看| 嫩草影院精品99| 欧美日韩综合久久久久久 | 成人亚洲精品av一区二区| 色哟哟·www| 国产精品国产高清国产av| 国产真实乱freesex| 国产不卡一卡二| 成人欧美大片| 久久午夜福利片| 久久久久亚洲av毛片大全| 黄色丝袜av网址大全| 美女xxoo啪啪120秒动态图 | 欧美色欧美亚洲另类二区| 亚洲,欧美精品.| 亚洲,欧美,日韩| 亚洲av第一区精品v没综合| 欧美+日韩+精品| 听说在线观看完整版免费高清| 国产伦人伦偷精品视频| 精品久久久久久久人妻蜜臀av| 99在线人妻在线中文字幕| 国产 一区 欧美 日韩| 一进一出好大好爽视频| 国产精品亚洲av一区麻豆| 欧美日本亚洲视频在线播放| 久久久久性生活片| 久久人人精品亚洲av| 免费看日本二区| eeuss影院久久| 成人亚洲精品av一区二区| 一区福利在线观看| 亚洲男人的天堂狠狠| 久久久成人免费电影| 国产综合懂色| 变态另类丝袜制服| 亚洲午夜理论影院| 深爱激情五月婷婷| 一个人看视频在线观看www免费| 91在线精品国自产拍蜜月| 又黄又爽又免费观看的视频| 女人十人毛片免费观看3o分钟| 国产精品一区二区三区四区免费观看 | 国产精品久久久久久精品电影| 黄色丝袜av网址大全| 免费高清视频大片| 午夜视频国产福利| 综合色av麻豆| 999久久久精品免费观看国产| 亚洲久久久久久中文字幕| 18禁在线播放成人免费|