Security Enhanced IEEE 802.1x Authentication Method for WLAN Mobile Router

Similar documents
Wireless Network Security Spring 2015

Chapter 24 Wireless Network Security

Wireless Network Security Spring 2016

Ju-A A Lee and Jae-Hyun Kim

Wireless Network Security

Configuring the Client Adapter through Windows CE.NET

1 FIVE STAGES OF I.

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Wireless LAN Security. Gabriel Clothier

A Secure Wireless LAN Access Technique for Home Network

Network Encryption 3 4/20/17

Atmel Trusted Platform Module June, 2014

Intelligent Terminal System Based on Trusted Platform Module

Unicorn: Two- Factor Attestation for Data Security

Security Fundamentals

WPA-GPG: Wireless authentication using GPG Key

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Authentication Part IV NOTE: Part IV includes all of Part III!

Configuring the Client Adapter through the Windows XP Operating System

WPA Passive Dictionary Attack Overview

Selection of EAP Authentication Method for use in a Public WLAN: Implementation Environment Based Approach

EXAM - PW Certified Wireless Security Professional (CWSP) Buy Full Product.

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Configuring the Client Adapter through the Windows XP Operating System

Cisco Systems 5760 Wireless LAN Controller

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

3 Data Link Layer Security

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

Security Setup CHAPTER

An Efficient WLAN Initial Access Authentication Protocol

Vol. 7, No. 6, June 2016 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Wireless technology Principles of Security

EAP-TLS Smartcards, from Dream to Reality

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

ENHANCING PUBLIC WIFI SECURITY

WLAN Roaming and Fast-Secure Roaming on CUWN

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points

Chapter 17. Wireless Network Security

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Network Security: WLAN Mobility. Tuomas Aura CS-E4300 Network security Aalto University, Autumn 2017

Selecting transition process for WLAN security

Lecture Embedded System Security Trusted Platform Module

Securing Your Wireless LAN

TPM v.s. Embedded Board. James Y

Configuring Authentication Types

But where'd that extra "s" come from, and what does it mean?

On the Internet, nobody knows you re a dog.

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module

IEEE 802.1X workshop. Networkshop 34, 4 April Josh Howlett, JRS Technical Support, University of Bristol. Copyright JNT Association

Crypto meets Web Security: Certificates and SSL/TLS

Encryption. INST 346, Section 0201 April 3, 2018

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module

COSC4377. Chapter 8 roadmap

Improved KRACK Attacks Against WPA2 Implementations. Mathy OPCDE, Dubai, 7 April 2018

KRACKing WPA2 in Practice Using Key Reinstallation Attacks. Mathy BlueHat IL, 24 January 2018

Troubleshooting WLANs (Part 2)

E-commerce security: SSL/TLS, SET and others. 4.1

Secure Initial Access Authentication in WLAN

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Mathy Vanhoef, PhD Wi-Fi Alliance meeting Bucharest, 24 October 2017

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

Secure and Seamless Handoff Scheme for a Wireless LAN System

CS Computer Networks 1: Authentication

Secure User Authentication Mechanism in Digital Home Network Environments

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Chaos Communication Congress (CCC), 27 December 2017

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Port-based authentication with IEEE Standard 802.1x. William J. Meador

Network Security 1. Module 7 Configure Trust and Identity at Layer 2

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD

Wireless Network Security

Table of Contents 1 WLAN Security Configuration Commands 1-1

FIPS Non-Proprietary Security Policy

Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD

WiMAX Security: Problems & Solutions

Appendix E Wireless Networking Basics

Chapter 6: Digital Certificates Introduction Authentication Methods PKI Digital Certificate Passing

Security analysis of WLAN roaming solutions

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU. Mc Graw mim

IEEE WiMax Security

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

WLAN Security Performance Study

Using Cryptography CMSC 414. October 16, 2017

KRACKing WPA2 by Forcing Nonce Reuse. Mathy Nullcon, 2 March 2018

Modeling and Verification of IEEE i Security Protocol for Internet of Things

Securing ARP and DHCP for mitigating link layer attacks

Exam Questions CWSP-205

FAQ on Cisco Aironet Wireless Security

Trusted Computing Group

Cryptography MIS

Physical and Link Layer Attacks

Network Access Flows APPENDIXB

Cryptography and Network Security Chapter 14

TRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection

TestsDumps. Latest Test Dumps for IT Exam Certification

Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2007

IT Exam Training online / Bootcamp

Transcription:

Security Enhanced IEEE 802.1x Method for WLAN Mobile Router Keun Young Park*, Yong Soo Kim*, Juho Kim* * Department of Computer Science & Engineering, Sogang University, Seoul, Korea kypark@sogang.ac.kr, kimmool @sogang.ac.kr, jhkim @sogang.ac.kr Abstract Along with the diffusion of smart devices that use WLAN, the number of WLAN Hotspot is rapidly increasing. A representative security threat in WLAN environments is hacking using rogue APs (Access Point). To prevent this security threat, the WLAN security standard applies the IEEE 802.1x authentication method. In this authentication method, RADIUS servers authenticate APs using static shared secrets. However, this method is not suitable for WLAN environments where mobile routers are used. Mobile routers are always exposed to device hacking and thus they are subject to very high risks of the leak of shared secrets. Therefore, they require securer authentication methods. In this paper, a new IEEE 802.1x based authentication method of which the security has been enhanced using TPMs (Trusted Platform Module) is proposed. Unlike existing methods, the proposed method involves no risk of authentication key leaks at all and can fundamentally block any attempt of hacking using rogue APs as the server verifies the integrity of APs in the process of authentication. Keywords WLAN, Access Point, IEEE 802.1x, TPM, Mobile Router I. INTRODUCTION Thanks to the development of WLAN technology and the expansion of infrastructures, an age has come where the Internet can be accessed anytime anywhere using WLAN. In particular, since WLAN Hotspots are established using 3G/4G Mobile Routers, it has become possible to use WLAN even in running buses or subways. By using a Mobile Router, a WLAN Hotspot can be established at a relatively low cost regardless of places. Therefore, it is expected that the use of Mobile Routers as WLAN APs will greatly increase in LTE or LTE-A based next generation communication environments. A representative security threat in WLAN environments is MITM (Man-in-the-middle) attacks using rogue APs. In these attacks, as shown in Figure 1, the attacker lures the user using an AP (Access Point) installed with a hacking tool and then intervenes in the middle of communication processes to tap or falsify the contents of communication while providing WLAN services [1]. To block these attacks, IEEE 802.11i, a WLAN security standard applies the IEEE 802.1x authentication method where RADIUS servers are used [2][3]. This security method supports diverse EAP (Extensible Protocol) based authentication protocols to provide diverse mutual authentication methods between the AP and the user device [4]. However, in WLAN environments configured using mobile routers; it is difficult to ensure sufficient security in the existing IEEE 802.1x authentication method. In the existing 802.1x authentication method, RADIUS servers authenticate each AP using only the static shared secret possessed by the AP and the MAC address of the AP is additionally used in some types of authentication. This method is effective in existing WLAN environments where APs are subordinate to LAN. However, the existing method that uses static shared secrets cannot provide a sufficient level of security in mobile router environments since APs are mobile and always exposed to hacking in these environments. If an attacker hacks into the mobile router in service to obtain the shared secret and MAC address, the attacker will be able to easily configure the rogue AP using these two pieces of information and attempt MITM attacks from anywhere. Therefore, mobile routers require security methods that have been strengthened further compared to existing IEEE 802.1x. Figure 1. Man in the middle attack using rogue access point In this paper, the vulnerability of the existing IEEE 802.1x authentication method in WLAN environments configured using mobile routers is demonstrated and an IEEE 802.1x based authentication method with enhanced security is proposed. The proposed method enables RADIUS servers to check the integrity and authenticity of each AP using the RTR ISBN 978-89-5519-162-2 549 Feb. 19~22, 2012 ICACT2012

(Root of Trust for Reporting) function of TPM to fundamentally block MITM attacks using rogue APs. This paper is composed as follows. In Chapter2, the vulnerability of the existing IEEE 802.1x authentication method and TPM are described and in Chapter 3, the proposed method is described. In Chapter 4, the security of the proposed method is analysed and in Chapter 5, the experimental results are shown. In Chapter 6, conclusions are formed II. RELATED WORKS A. Research on IEEE 802.1x security technology IEEE 802.11i, a WLAN security standard employed IEEE 802.1x as a large frame for WLAN system user authentication and key exchanges and defined it as an essential item to be implemented for security. IEEE 802.1x defines port based access control functions and supports diverse TLS based EAP mutual authentication protocols. Therefore, it enables mutual authentication between the AP and the user device thereby providing a means to block MITM attacks using rogue APs. User Device Server Searching Phase-IEEE 802.11 & 11i Becon/Probe Open MSK(Master Session Key) Generation PMK Generation PTK Generation 4-way Handshaking (PMK validation, GTK transfer) GTK Access Point Mutual Phase-IEEE 802.1x EAP-MD5, EAP-TLS, EAP-TTLS Key Management Phase-IEEE 802.11i Data Transfer Phase-IEEE 802.11i CCMP Encrypted Unicast Message Integrity Protected Beacon Message AAA-Key:MSK PMK(Pairwise Master Key) Generation PTK(Pairwise Transient key) Generation GTK(Group Temporal Key) Generation RADIUS Server User Device MSK Generation Figure 2. WLAN security procedure based on IEEE 802.11i & IEEE 802.1x Figure 2 shows a device that uses IEEE 802.1x in IEEE 802.11i and the procedure for mutual authentication between the device and an AP. In the IEEE 802.11i security standard, IEEE 802.1x largely serves the roles of conducting user authentication and delivering MSKs (Master Session Key) generated in the process of the authentication to be used for wireless MAC layer security to APs. This procedure is as follows. First, in the Mutual Phase shown in Figure 2, mutual authentication between the wireless device and the RADIUS server is performed through a TLS based EAP authentication protocol such as EAP-MD5, EAP-TLS or EAP-TTLS. Then, the user device and the server create a MSK necessary for the encryption of wireless links between the user device and an AP using the TMS (TLS Master Secret) shared in the process of authentication. Now, the server delivers the created MSK to the AP. The AP does not know the MSK because the AP is not an end point of the EAP authentication protocol. The server delivers the generated MSK to the AP using a RADIUS packet. At this time, the MSK is encrypted using the shared secret between the AP and the server. Thereafter, the user device and the AP generate a PMK (Pairwise Master Key) using the MSK. Then, the user device verifies if the AP has the same PMK as the one owned by the user device through a key management procedure specified as a 4-way handshake procedure using EAPoL-Key frames with the AP to authenticate the AP. When all the verification procedures have been completed, the user device encrypts data frames on wireless links using key sets generated using the PMK. B. Security problems of IEEE 802.1x authentication method in WLAN using mobile router In the mutual authentication phase of the IEEE 802.11i security procedure, the user device and the server authenticate each other using an EAP based authentication protocol. On the other hand, the user device and the AP mutually authenticate in the key management phase. In this process, the user device and the AP check each other if the other party has the same PMK as the one owned by him through a 4-way handshake to authenticate the party. In the IEEE 802.11i security procedure, the user device and the AP generate a PMK using the MSK generated through a key exchange procedure between user device and the server in the mutual authentication phase. When the server delivers the MSK to an AP, the server encrypts the MSK using the shared secret with the AP as a key. Therefore, when seen from the standpoint of the user device, if the AP had the same PMK as possessed by it, that means that the AP currently accessed by it is the real AP known by the server. Consequently, from the standpoint of the user device, AP authentication can be said to be a process through which the user device checks whether the AP knows the shared secret. The existing authentication method applied to IEEE 802.1x that uses shared secrets between APs and servers is a relatively safe method in WLAN environments configured with LAN based APs. In these environments, APs are fixed to certain positions and thus physical security may be expected depending on environments where APs are installed and MAC address based additional access controls may be applied using LAN switches, etc.. However, in WLAN environments where mobile routers are used, the existing IEEE 802.1x authentication method cannot provide a sufficiently high level of security any further. Mobile routers are mobile and portable and physical security for them cannot be expected and they are always exposed to the risks of robbery and device hacking. Furthermore, shared keys exist as plaintexts in APs configuration files. Therefore, if an attacker obtains a mobile router currently in service and finds out the router s shared secret with the server through device hacking mobilizing reverse engineering, the attacker will become able to easily configure rogue APs with the mobile router owned by him ISBN 978-89-5519-162-2 550 Feb. 19~22, 2012 ICACT2012

using the information. Therefore, for WLAN environments where mobile routers are used, authentication methods should be equipped with the following two security requirements. Req.1: Even if an attacker hacks an AP, the attacker should not be able to find out the shared key and MSK used for authentication. Req.2: Even if a device is hacked, it should not affect the safety of the authentication system or other devices. C. Trusted Platform Module A TPM is a secure crypto processor composed of an independent chipset. As shown in Figure 3, each TPM is equipped with not only a Random Number Generator and a Hash engine but also a RSA key generator, a key storage, and an RSA engine [5]. Figure 3. Architecture of Trusted Platform Module All TPMs have a 2048-bit RSA asymmetric key pair called Endorsement Key (EK). Each EK is unique to each TPM. It is generated chipset manufacturing time and cannot be changed. Furthermore, each EK s private key exists in the TPM only and thus cannot be analysed at all and public keys are safely distributed through certificates signed by the CA or the manufacturer. Major functions of TPMs include RTM (Root of Trust for Measurement) and RTR (Root of Trust for Report). The RTM is a process for a TPM to verify the integrity of software in each device where the Hash values of software currently being executed are calculated and the results are accumulated in PCRs(Platform Configuration Registers) in the TPM. The RTR is a function to report system conditions to third parties by signing on the values of PCRs generated in the process of RTMs with private key in TPMs and sending the values to third parties. For RTRs, TPMs generate and use RSA key pairs called AIK (Attestation Identity Keys). MSK are delivered to the AP so that the MSK can be decrypted using only the TPM. For the aforementioned features, the proposed method has the following preconditions for APs and servers. Access Point: All APs are assumed to have been equipped with a TPM. Each TPM has a unique EK and the certification of the EK issued by the manufacturer of the TPM or APs. RADIUS Server: The server has AP Serial Number (SN) and EK lists stored in its database along with information for user authentication. It also has default PCRs values for individual AP models and software versions in its database. In the proposed method, only those APs that have been registered in the server in advance can be authenticated by the server to provide WLAN services. Therefore, all APs should be registered with the server through specified procedures. The proposed method is composed of a process to register APs to servers and an IEEE 802.1x based authentication process using registered APs. B. Access Point initialization & registration procedure In the proposed method, for a WLAN AP to be authenticated by a RADIUS server, the AIK of the TPM should be generated and then the certificate of the AIK should be registered with the server. This process is as shown in Figure 4. III. PROPOSED METHOD A. Overview of proposed authentication method Unlike the existing IEEE 802.1x authentication method, the method proposed in this paper does not use the static shared secret in authentication between RADIUS servers and APs but applies a new device authentication method using TPM. The proposed method has been enabled to authenticate APs of which the access is requested by the server using the EK and RTR function of TPM as well as verifying the integrity of the APs. Furthermore, it has been made to encrypt MSK generated through mutual authentication between the user device and the server using a public key of the TPM when the Figure 4. Access Point initialization & registration procedure ISBN 978-89-5519-162-2 551 Feb. 19~22, 2012 ICACT2012

An AP initializes its TPM and generates an AIK asymmetric key pair. Then, it requests the CA (Certificate Authority) to issue a certificate for the generated AIK. In this case, the AIK pub, the public key of the AIK and the EK cert, the certificate of the TPM are encrypted with the CA_pub, the public key of the CA and the result, E CA_pub (AIK pub, EK cert ) is transmitted to the CA to request for the issuance of the certificate. Then, the CA verifies the message transmitted by the AP requesting for the issuance of the certificate and issues AIK cert, the certificate of the AIK. First, the CA decrypt the request from the AP using its private key, CA_pri to obtain AIK pub and EK cert. Then, the CA verifies EK cert and issues an AIK cert that includes the AIK pub and was signed by its private key. Then, the CA encrypts the issued AIK cert with the public key of the TPM included in the EK cert and deliver to the AP. Finally, the AP checks the AIK cert generated by the CA and registers the AIK cert with the RADIUS server. First, the AP decrypts the E EK_pub (AIK cert ) delivered by the CA using EK_pri, its private key to obtain the AIK cert issued by the CA. Then, it sends an AIK registration request to the server along with an SN and obtains a random nonce N R generated by the server. Then, it encrypts the AIK cert and the N R using the EK_pri to obtain an E EK_pri (AIK cert N R ) and transmits it to the server to request for registration. Now, the server finds out the EK cert of the AP using the SN transmitted by the AP and then decrypts the message transmitted by the EK pub AP to obtain the AIK cert and the N R. If the obtained N R is the same as the value generated by it, the server stores the AIK cert in its database and finishes the registration procedure. C. IEEE 802.1x authentication procedure The proposed IEEE 802.1x authenticate method is as shown in Figure 5. It is assumed that the WLAN AP has been already registered with the RADIUS server. After the initial wireless access procedure between the user device and the AP, the AP should prove its integrity to the server to be authenticated before a mutual authentication phase between the user device and the server begins. This process is as follows. First, the AP sends an SN to the server to request for access. Then, the server checks the SN transmitted by the AP, generates a random nonce N A and transmits it to the AP to request for device attestation. Now, on receipt of the request, the AP generates an attestation value using its TPM. The TPM concatenates the PCRs values generated in the device boot procedure with the N A, signs on the result using its AIK pri to obtain an attestation value and transmits the value to the server. Now, the server verifies the attestation value delivered by the AP to authenticate the AP. First, the server loads the AIK cert of the AP and the default PCR value PCRs from its database using the SN. Then, the server decrypts the attestation value delivered by the AP using the AIK pub and compares it with the PCRs and N A possessed by it to authenticate and verify the integrity of the AP device. Then, the server notifies the result to the AP. When the Device authentication procedure has been completed, the user device and the server perform TLS based EAP mutual authentication and deliver the MSK generated through the authentication to the AP. In this case, the server Figure 5. Security enhanced IEEE 802.1x authentication procedure encrypts the MSK using the EK_pub, the TPM public key of the AP before delivering it. On receipt of it, the AP delivers the encrypted MSK to the TPM so that it is decrypted in the TPM using its EK_pri. When this process has been completed, the PMK generation and 4-way handshake processes as used in the existing method are undergone to perform authentication and key agreement between the user device and the AP and begin encrypted communication in the wireless link. IV. SECURITY ANALYSIS The method proposed in this paper provides a higher level of security compared to the existing IEEE 802.1x authentication method. In the proposed method, only those APs registered with the RADIUS server in advance and verified for integrity can provide WLAN services. In the AP initialization & registration procedure, the server decrypts the E EK_pri (AIK cert N R ) delivered by the AP using the EK cert corresponding to the SN and compared the N R with the values generated by it. On the other hand, the key EK_pri used by the AP in the encryption exists only in the TPM and cannot be modified. Therefore, only those APs known by the server can register their AIK cert. In the authentication procedure of the proposed method, the server verifies the attestation value presented by the AP requesting for access to authenticate the AP. That is, the server compares the N A obtained by decrypting the attestation value generated by the TPM of the AP with the N A possessed ISBN 978-89-5519-162-2 552 Feb. 19~22, 2012 ICACT2012

by it to see if they are the same to check whether the AP has been registered in advance and verifies the integrity of the AP by comparing PCRs values. This method provides a higher level of security compared to the existing method where anyone that knows the server s shared secret can be authenticated by the server. In addition, the proposed method encrypts the EK_pub of the TPM with a key in the process of delivering the MSK generated through mutual authentication between the user and the server to the AP. The EK_pri of the TPM exists only in the TPM. Therefore, the encrypted MSK can be decrypted by only those APs registered with the server. Therefore, this method provides a higher level of security compared to existing methods where anybody that knew shared secrets could decrypt MSK. V. EXPERIMENT The method proposed in this paper requires additional asymmetric key cryptographic operations for AIK cert registration processes and AP authentication processes compared to the existing IEEE 802.1x authentication method. Furthermore, all these cryptographic operations on APs are performed by TPMs. Therefore, the size of the overhead of the proposed method is determined by the cryptographic operation time of TPMs. TABLE 1. EXECUTION OVERHEAD OF CRYPTOGRAPHIC OPERATIONS OF PROPOSED METHOD ON ACCESS POINT (MS) Phase Key generation Registration 758.00 (E)ncryption, (D)ecryption E.1: 594.23, D.1: 532.24, E.2: 561.68 PCR Read PCR Sign 0 0 0 D.1: 556.34 46.01 511.44 blocked. However, the proposed method does not require any change in WLAN user devices. In addition, since TPMs provide most software toolkits necessary for its application even though they are cheap and thus the proposed method can be applied easily at low costs. ACKNOWLEDGMENT This study was conducted with the support of the Telecommunication R&D center of Samsung Electronics Co., Ltd. REFERENCES [1] R. H. Rahman, N. N. Nowsheen, M. A. Khan and V. H. Khan, Wireless Lan Security: An In-Depth Study of the Threat and Vulnerabilities, Asian Journal of Information Technology, vol. 6(4), pp.441-446, 2007. [2] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification Amendment 6: Medium Access Control (MAC) Security Enhancements, IEEE Std. 802.11i, 2004. [3] DRAFT Standard for Local and Metropolitan Area Networks-Port- Based Network Access Control (Revision), IEEE P802.1x-REV/D11, 2004. [4] K. M. Ali and T. J. Owens, Selection of an EAP authentication method for a WLN, International Journal of Information and Computer Security, vol. 1(1), pp. 210-233, 2007 [5] TPM Main Part 1 Design Principles: Specification version 1.2, Trusted Computing Group, 2011. [6] L. Sarmenta, J. Rhodes, T. Muller, TPM/J Java-based API for the Trusted Platform Moudle (TPM), MIT CSAIL, Available: http://tpmemulator.berlios.de/, Nov. 25 Table 1 shows the results of measurements of the overheads for cryptographic operations on APs required in the process of implementing each phase of the proposed method. The experimental environment was implemented using TPM/J API [6] on Linux kernel ver.2.6.25.4 and the overheads were measured using ATMEL TPM Ver. 1.2. installed on Lenovo ThinkPad X60s(Intel Core Duo 1.6GHz, 1GB RAM). As shown in the experimental results, the time required to perform the cryptographic operations of the proposed method on a TPM is very short. Therefore, the effect of the proposed method on the authentication procedure of APs is not big. VI. CONCLUSIONS In this paper, a new IEEE 802.1x based authentication method with enhanced security was proposed. The proposed method applied the RTR function of TPMs to authentication procedures between APs and servers so that the integrity of the APs requesting access is verified. Furthermore, the method was made to authenticate APs using EKs, unique keys of TPMs to safely deliver MSKs generated through authentication to APs. Therefore, by applying the proposed method, MITM attacks using rogue APs can be fundamentally ISBN 978-89-5519-162-2 553 Feb. 19~22, 2012 ICACT2012