Fifth IEE International Conference on 3G Mobile Communication Technologies (3G 2004) the Premier Technical Conference for 3G An 2004
DOI: 10.1049/cp:20040635
|View full text |Cite
|
Sign up to set email alerts
|

Novel WLAN hotspot authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2009
2009
2009
2009

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Another widely used form of authentication in WLANs, recommended by Wi-Fi alliance as a best practice solution [6], is web-based such that the mobile user provides own credentials as input to the browser form. This technique when based on the username / password is also known as the Universal Access Method (UAM), see also [7,8,41] for some variations. These credentials are usually forwarded to the authentication server (e.g., RADIUS).…”
Section: Wireless Roaming In Ip Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Another widely used form of authentication in WLANs, recommended by Wi-Fi alliance as a best practice solution [6], is web-based such that the mobile user provides own credentials as input to the browser form. This technique when based on the username / password is also known as the Universal Access Method (UAM), see also [7,8,41] for some variations. These credentials are usually forwarded to the authentication server (e.g., RADIUS).…”
Section: Wireless Roaming In Ip Networkmentioning
confidence: 99%
“…As noticed in [43] such web-based solutions become vulnerable to the access point impersonation, address spoofing, and dictionary attacks. Some improvements to UAM supporting further types of credentials reducing the required user interaction to opening a web-browser have been described by McCann et al [41].…”
Section: Wireless Roaming In Ip Networkmentioning
confidence: 99%