Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography

被引:0
|
作者
Noh, Jaewon [1 ]
Kim, Jeehyeong [1 ]
Kwon, Giwon [1 ]
Cho, Sunghyun [1 ]
机构
[1] Hanyang Univ, Seoul, South Korea
关键词
Wi-Fi; WPA; WPA2; PSK; Authentication; Public key; Security; Key exchange;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes authentication and key exchange scheme to communicate between users securely in small scale Wi-Fi networks. Depend on the Wi-Fi options, there can be various vulnerabilities in the network. Especially, most of small scale Wi-Fi networks have used the options which can cause several vulnerabilities. These Wi-Fi networks use passphrase for access authentication. However, these passphrases are known by the small network owner. In such circumstances, the network cannot assure security between users in the same network. In the existing Wi-Fi network, attackers in the same network can acquire pairwise keys by eavesdropping messages. Thus, this paper proposes the secure key exchange scheme to apply a public key cryptography. Using public key system, a station and an access point exchange a secondary key which user selects. This key is used for pairwise key generation. Through the proposed scheme, the network can protect users from several attacks in the same Wi-Fi network.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography
    Rajendiran, Kishore
    Sankararajan, Radha
    Palaniappan, Ramasamy
    ETRI JOURNAL, 2011, 33 (05) : 791 - 801
  • [22] Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
    Vanhoef, Mathy
    Piessens, Frank
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1313 - 1328
  • [23] Secure Session Key Sharing Using Symmetric Key Cryptography
    Arora, Shweta
    Hussain, Muzzammil
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 850 - 855
  • [24] A key distribution scheme based on public key cryptography for sensor networks
    Li, Xiaolong
    Lin, Yaping
    Yang, Siqing
    Yi, Yeqing
    Yu, Jianping
    Lu, Xinguo
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 725 - +
  • [25] The Design of Public Key Cryptography for Key Exchange Base on Multivariate Equations
    Liu Changming
    Zhao Lei
    Sun Yanjun
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 552 - 554
  • [26] KEY EXCHANGE USING KEYLESS CRYPTOGRAPHY
    ALPERN, B
    SCHNEIDER, FB
    INFORMATION PROCESSING LETTERS, 1983, 16 (02) : 79 - 81
  • [27] Secure transmission of video on an end system multicast using public key cryptography
    Akkus, Istemi Ekin
    Ozkasap, Oznur
    Civanlar, M. Reha
    MULTIMEDIA CONTENT REPRESENTATION, CLASSIFICATION AND SECURITY, 2006, 4105 : 603 - 610
  • [28] Analysis and design of a secure key exchange scheme
    Alvarez, Rafael
    Tortosa, Leandro
    Vicent, Jose-Fco.
    Zamora, Antonio
    INFORMATION SCIENCES, 2009, 179 (12) : 2014 - 2021
  • [29] Secure Key Exchange Scheme for IPTV Broadcasting
    Pippal, Ravi Singh
    Tapaswi, Shashikala
    Jaidhar, C. D.
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (01): : 48 - 53
  • [30] A key distribution scheme based on public key cryptography for wireless sensor networks
    Li, Xiaolong
    Lin, Yaping
    Yi, Yeqing
    Yu, Jianping
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1113 - 1116