Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography

被引:0
|
作者
Noh, Jaewon [1 ]
Kim, Jeehyeong [1 ]
Kwon, Giwon [1 ]
Cho, Sunghyun [1 ]
机构
[1] Hanyang Univ, Seoul, South Korea
关键词
Wi-Fi; WPA; WPA2; PSK; Authentication; Public key; Security; Key exchange;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes authentication and key exchange scheme to communicate between users securely in small scale Wi-Fi networks. Depend on the Wi-Fi options, there can be various vulnerabilities in the network. Especially, most of small scale Wi-Fi networks have used the options which can cause several vulnerabilities. These Wi-Fi networks use passphrase for access authentication. However, these passphrases are known by the small network owner. In such circumstances, the network cannot assure security between users in the same network. In the existing Wi-Fi network, attackers in the same network can acquire pairwise keys by eavesdropping messages. Thus, this paper proposes the secure key exchange scheme to apply a public key cryptography. Using public key system, a station and an access point exchange a secondary key which user selects. This key is used for pairwise key generation. Through the proposed scheme, the network can protect users from several attacks in the same Wi-Fi network.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A Secure Session Key Negotiation Scheme in WPA2-PSK Networks
    Guo, Jiang
    Wang, Miao
    Zhang, Hanwen
    Zhang, Yujun
    2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2020,
  • [2] Defense of WPA/WPA2-PSK Brute Forcer
    Liu Yong-lei
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 185 - 188
  • [3] WPA/WPA2-PSK的安全性分析与改进
    吴一尘
    计算机与现代化, 2013, (01) : 153 - 157
  • [4] Password Recovery for WPA/WPA2-PSK Based on Parallel Random Search with GPU
    Ge, Liang
    Wang, Lianhai
    Xu, Lijuan
    Yang, Shumian
    WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 1149 - 1159
  • [5] Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture
    Liu Yong-lei
    Jin Zhi-gang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (04) : 723 - 742
  • [6] Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-Enterprise
    Radivilova, Tamara
    Hassan, Hassan Ali
    2017 SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES AND RADIO ELECTRONICS (UKRMICO), 2017,
  • [7] wpa/wpa2-psk高速暴力破解器的设计和实现
    刘永磊
    金志刚
    陈喆
    刘京伟
    计算机工程, 2011, 37 (10) : 125 - 127
  • [8] A Method for Cracking the Password of WPA2-PSK Based on SA and HMM
    Ge, Liang
    Wang, Lianhai
    Xu, Lijuan
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2016, : 59 - 62
  • [9] Analysis and countermeasure on vulnerability of WPA key exchange mechanism
    Kang, YS
    Oh, KH
    Chung, BH
    Chung, K
    Nyang, D
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 915 - 924
  • [10] Parallel Active Dictionary Attack on WPA2-PSK Wi-Fi Networks
    Nakhila, Omar
    Attiah, Afraa
    Jin, Yier
    Zou, Cliff
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 665 - 670