Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography

被引:0
|
作者
Noh, Jaewon [1 ]
Kim, Jeehyeong [1 ]
Kwon, Giwon [1 ]
Cho, Sunghyun [1 ]
机构
[1] Hanyang Univ, Seoul, South Korea
关键词
Wi-Fi; WPA; WPA2; PSK; Authentication; Public key; Security; Key exchange;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes authentication and key exchange scheme to communicate between users securely in small scale Wi-Fi networks. Depend on the Wi-Fi options, there can be various vulnerabilities in the network. Especially, most of small scale Wi-Fi networks have used the options which can cause several vulnerabilities. These Wi-Fi networks use passphrase for access authentication. However, these passphrases are known by the small network owner. In such circumstances, the network cannot assure security between users in the same network. In the existing Wi-Fi network, attackers in the same network can acquire pairwise keys by eavesdropping messages. Thus, this paper proposes the secure key exchange scheme to apply a public key cryptography. Using public key system, a station and an access point exchange a secondary key which user selects. This key is used for pairwise key generation. Through the proposed scheme, the network can protect users from several attacks in the same Wi-Fi network.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [42] Public key cryptography using sphere and spheroid
    Singh, K. John
    Gagneja, Kunal
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (03) : 363 - 383
  • [43] Using decision problems in public key cryptography
    GROUP-BASED CRYPTOGRAPHY, 2008, : 77 - 93
  • [44] Secure biometric key generation scheme for cryptography using combined biometric features of fingerprint and iris
    Balakumar, P.
    Venkatesan, R.
    International Journal of Computer Science Issues, 2011, 8 (5 5-2): : 349 - 356
  • [45] Public Key Exchange scheme that is Addressable (PKA)
    Habib, Bilal
    Cambou, Bertrand
    Booher, Duane
    Philabaum, Christopher
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 392 - 393
  • [46] A More Efficient and Secure Broadcast Signcryption Scheme Using Certificateless Public-Key Cryptography for Resource-Constrained Networks
    Luo, Ming
    Wang, Siqin
    Hu, Jun
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (01): : 81 - 89
  • [47] Secure Data Transfer in Manet with Key Calculator and Key Distributer Using Cryptography Methods
    Alapati Y.K.
    Ravichandran S.
    Alapati, Yaswanth Kumar (aykumar@rvrjc.ac.in); Ravichandran, Suban (aykumar@rvrjc.ac.in), 1600, International Information and Engineering Technology Association (10): : 567 - 572
  • [48] Distributed Public Key Infrastructure and PSK Exchange Based on Blockchain Technology
    Kfoury, Elie
    Khoury, David
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1116 - 1120
  • [49] A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks
    Chuang, Po-Jen
    Chang, Shao-Hsuan
    Lin, Chih-Shin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1859 - 1873
  • [50] Secure authenticated key exchange protocol based on EC using signcryption scheme
    Kim, Rack-Hyun
    Youm, Heung-Youl
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 74 - +