TUTCRIS - Tampereen teknillinen yliopisto


Cryptographic security designs and hardware architectures for wireless local area networks



KustantajaTampere University of Technology
ISBN (elektroninen) 952-15-1736-0
ISBN (painettu)952-15-1685-2
TilaJulkaistu - 8 joulukuuta 2006
OKM-julkaisutyyppiG5 Artikkeliväitöskirja


NimiTampere University of Technology. Publication
KustantajaTampere University of Technology
ISSN (painettu)1459-2045


Wireless Local Area Networks (WLAN) have developed to widely utilized technologies for short-range telecommunications. While the technologies enable various new services, the wireless environment and the constraints of WLAN devices set new requirements for network security and its realization. In addition to a security specification, a security processing implementation has a key role in protecting WLANs. This Thesis presents designs and implementations for protecting WLANs using cryptographic mechanisms. The focus of the Thesis is on the security of the standard WLAN technologies which have recently been driving the markets and the research work. The technologies, their problems, and proposed improvements are surveyed. A design specifically addressing the vulnerabilities of Bluetooth is presented. Furthermore, designs for protecting stored data and maintaining time synchronization in WLANs are developed. The generally accepted security design practices and the constraints of the WLAN devices are respected throughout the presented designs. Cryptographic software implementations cannot often provide security with high performance and usability while meeting the restrictions of WLAN devices. Therefore, the Thesis presents cryptographic hardware architectures that can efficiently be used for securing WLANs. The architectures support the cryptographic mechanisms of the standard WLANs as well as the mechanisms proposed in the Thesis. Several solutions providing different trade-offs between performance and resource consumption are developed for Advanced Encryption Standard (AES), Triple Data Encryption Standard (3DES), and RC4 as well as for the modular exponentiation of public-key schemes. Related implementations are surveyed and compared. As an example of a full, security-oriented application, the separate components are integrated into a novel wireless Real-Time Betting (RTB) application. It utilizes the security designs and implementations on the wireless data link layer as well as on the application layer in order to support efficient embedded terminal implementations. The RTB application is especially seen well-suited for providing local services through WLANs.


Latausten tilastot

Ei tietoja saatavilla