Analysis and countermeasure on vulnerability of WPA key exchange mechanism

被引:0
|
作者
Kang, YS [1 ]
Oh, KH
Chung, BH
Chung, K
Nyang, D
机构
[1] Elect & Telecommun Res Inst, Informat Secur Res Div, Taejon 305350, South Korea
[2] Inha Univ, Grad Sch Informat Technol & Telecommun, Inchon 402753, South Korea
关键词
WLAN security; WPA; 802.11i; 802.1X;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyze some weaknesses in WPA authenticator key management state machine and propose the countermeasures to overcome these problems. Our researches on IEEE 802.11i authenticator state machine that is WPA authenticator key management state machine reveal that the state machine cannot support the stable group key setting and is vulnerable to the replay attack and DoS attack. We describe 3 problems related to these vulnerabilities, propose the respective solutions and reconstruct WPA authenticator key management state machine to which the alternative solutions are applied.
引用
收藏
页码:915 / 924
页数:10
相关论文
共 50 条
  • [1] Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography
    Noh, Jaewon
    Kim, Jeehyeong
    Kwon, Giwon
    Cho, Sunghyun
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-ASIA (ICCE-ASIA), 2016,
  • [2] BHP flooding vulnerability and countermeasure
    Sliti, Maha
    Boudriga, Noureddine
    PHOTONIC NETWORK COMMUNICATIONS, 2015, 29 (02) : 198 - 213
  • [3] BHP flooding vulnerability and countermeasure
    Maha Sliti
    Noureddine Boudriga
    Photonic Network Communications, 2015, 29 : 198 - 213
  • [4] Investigation of Drone Vulnerability and its Countermeasure
    Pojsomphong, Nualrath
    Visoottiviseth, Vasaka
    Sawangphol, Wudhichart
    Khurat, Assadarat
    Kashihara, Shigeru
    Fall, Doudou
    IEEE 10TH SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE 2020), 2020, : 251 - 255
  • [5] Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection
    Doynikova, Elena
    Fedorchenko, Andrey
    Kotenko, Igor
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [6] Integrated mechanism of routing and key exchange in AODV
    Information Security Department, College of Signals, National University of Science and Technology, Tamizuddin Road, Rawalpindi, Pakistan
    WSEAS Trans. Commun., 2007, 4 (565-572):
  • [7] Member Tampering Attack on Burmester-Desmedt Group Key Exchange Protocol and Its Countermeasure
    Sun, Da-Zhi
    Tian, Yangguang
    MATHEMATICS, 2022, 10 (19)
  • [8] Weaknesses Analysis and Countermeasure of a Verifier-based Key Agreement Protocol
    Kim, Hyun-Seok
    Seo, Seok
    Choi, Jin-Young
    HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1015 - 1018
  • [9] Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions
    Chatterjee, Urbi
    Sadhukhan, Rajat
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Mahata, Debashis
    Prabhu, Mukesh M.
    WWW'20: COMPANION PROCEEDINGS OF THE WEB CONFERENCE 2020, 2020, : 217 - 221
  • [10] Analysis on Supervision Mechanism and Countermeasure of China's Food Safety
    Yang, Guanying
    2012 INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2012), VOL 7, 2012, 7 : 490 - 494