University of Oulu

A. K. Yadav, M. Misra, P. K. Pandey, K. Kaur, S. Garg and M. Liyanage, "LEMAP: A Lightweight EAP based Mutual Authentication Protocol for IEEE 802.11 WLAN," ICC 2022 - IEEE International Conference on Communications, Seoul, Korea, Republic of, 2022, pp. 692-697, doi: 10.1109/ICC45855.2022.9839094.

LEMAP : a lightweight EAP based mutual authentication protocol for IEEE 802.11 WLAN

Saved in:
Author: Yadav, Awaneesh Kumar1; Misra, Manoj1; Pandey, Pradumn Kumar1;
Organizations: 1Dept. of Computer Science and Engineering, Indian Institute of Technology Roorkee, Roorkee, Uttarakhand, India
2Electrical Engineering Department, École de technologie supérieure (ÉTS), Montreal, QC, Canada
3School of Computer Science, University College Dublin, Ireland
4CWC, University of Oulu, Finland
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 0.4 MB)
Persistent link:
Language: English
Published: Institute of Electrical and Electronics Engineers, 2022
Publish Date: 2023-01-12


The growing usage of wireless devices has significantly increased the need for Wireless Local Area Network (WLAN) during the past two decades. However, security (most notably authentication) remains a major roadblock to WLAN adoption. Several authentication protocols exist for verifying a supplicant’s identity who attempts to connect his wireless device to an access point (AP) of an organization’s WLAN. Many of these protocols use the Extensible Authentication Protocol (EAP) framework. These protocols are either vulnerable to attacks such as violation of perfect forward secrecy, replay attack, synchronization attack, privileged insider attack, and identity theft or require high computational and communication costs. In this paper, a lightweight EAP-based authentication protocol for IEEE 802.11 WLAN is proposed that not only addresses the security issues in the existing WLAN authentication protocols but is also cost-effective. The security of the proposed protocol is verified using BAN logic and the Scyther tool. Our analysis shows that the proposed protocol is safe against all the above attacks and attacks defined in RFC-4017. A comparison of the computational and communication costs of the proposed protocol with other existing state-of-the-art protocols shows that the proposed protocol is lightweight than existing solutions.

see all

Series: IEEE International Conference on Communications
ISSN: 1550-3607
ISSN-E: 1938-1883
ISSN-L: 1550-3607
ISBN: 978-1-5386-8347-7
ISBN Print: 978-1-5386-8348-4
Pages: 692 - 697
DOI: 10.1109/icc45855.2022.9839094
Host publication: ICC 2022 - IEEE International Conference on Communications
Conference: IEEE International Conference on Communications
Type of Publication: A4 Article in conference proceedings
Field of Science: 213 Electronic, automation and communications engineering, electronics
Funding: This work is partly supported by Academy of Finland in 6Genesis (grant no. 318927) and Science Foundation Ireland under CONNECT phase 2 (Grant no. 13/RC/2077_P2) projects.
Academy of Finland Grant Number: 318927
Detailed Information: 318927 (Academy of Finland Funding decision)
Copyright information: © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.