Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography

被引:0
|
作者
Noh, Jaewon [1 ]
Kim, Jeehyeong [1 ]
Kwon, Giwon [1 ]
Cho, Sunghyun [1 ]
机构
[1] Hanyang Univ, Seoul, South Korea
关键词
Wi-Fi; WPA; WPA2; PSK; Authentication; Public key; Security; Key exchange;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes authentication and key exchange scheme to communicate between users securely in small scale Wi-Fi networks. Depend on the Wi-Fi options, there can be various vulnerabilities in the network. Especially, most of small scale Wi-Fi networks have used the options which can cause several vulnerabilities. These Wi-Fi networks use passphrase for access authentication. However, these passphrases are known by the small network owner. In such circumstances, the network cannot assure security between users in the same network. In the existing Wi-Fi network, attackers in the same network can acquire pairwise keys by eavesdropping messages. Thus, this paper proposes the secure key exchange scheme to apply a public key cryptography. Using public key system, a station and an access point exchange a secondary key which user selects. This key is used for pairwise key generation. Through the proposed scheme, the network can protect users from several attacks in the same Wi-Fi network.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Secure Random Phase Key Exchange Schemes for Image Cryptography
    Kim, Youhyun
    Sim, Minwoo
    Moon, Inkyu
    Javidi, Bahram
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 10855 - 10861
  • [32] A SECURE PUBLIC-KEY AUTHENTICATION SCHEME
    GALIL, Z
    HABER, S
    YUNG, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 3 - 15
  • [33] A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    Wang, Fengjiao
    Zhang, Yuqing
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2142 - 2149
  • [34] A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    Wang, Fengjiao
    Zhang, Yuqing
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 809 - 814
  • [35] SA-SPKC: Secure and efficient Aggregation scheme for wireless sensor networks using Stateful Public Key Cryptography
    Rafik, Merad Boudia Omar
    Mohammed, Feham
    2013 11TH INTERNATIONAL SYMPOSIUM ON PROGRAMMING AND SYSTEMS (ISPS), 2013, : 96 - 102
  • [36] A Secure Key Exchange Protocol and a Public Key Cryptosystem for Healthcare Systems
    Yuvasri, R.
    Manimaran, A.
    CONTEMPORARY MATHEMATICS, 2024, 5 (02): : 2402 - 2418
  • [37] SCHEME FOR SECURE DIGITAL MOBILE COMMUNICATIONS BASED ON SYMMETRICAL KEY CRYPTOGRAPHY
    HWANG, T
    INFORMATION PROCESSING LETTERS, 1993, 48 (01) : 35 - 37
  • [38] A new secure e-mail scheme based on Elliptic Curve Cryptography Combined Public Key
    Zhang, Yi
    Cui, Tianxi
    Tang, Hong
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 336 - +
  • [39] Using probabilistic argumentation for key validation in public-key cryptography
    Haenni, R
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2005, 38 (03) : 355 - 376
  • [40] Using Decision Problems in Public Key Cryptography
    Shipilrain, Vladimir
    Zapata, Gabriel
    GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (01) : 33 - 49