Analysis and countermeasure on vulnerability of WPA key exchange mechanism

被引:0
|
作者
Kang, YS [1 ]
Oh, KH
Chung, BH
Chung, K
Nyang, D
机构
[1] Elect & Telecommun Res Inst, Informat Secur Res Div, Taejon 305350, South Korea
[2] Inha Univ, Grad Sch Informat Technol & Telecommun, Inchon 402753, South Korea
关键词
WLAN security; WPA; 802.11i; 802.1X;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we analyze some weaknesses in WPA authenticator key management state machine and propose the countermeasures to overcome these problems. Our researches on IEEE 802.11i authenticator state machine that is WPA authenticator key management state machine reveal that the state machine cannot support the stable group key setting and is vulnerable to the replay attack and DoS attack. We describe 3 problems related to these vulnerabilities, propose the respective solutions and reconstruct WPA authenticator key management state machine to which the alternative solutions are applied.
引用
收藏
页码:915 / 924
页数:10
相关论文
共 50 条
  • [21] The proposal of power analysis for common key cryptography implemented on the FPGA and its countermeasure
    Yamaguchi, T
    Hashiyama, T
    Okuma, S
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2005, 88 (08): : 28 - 37
  • [22] A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure
    Barenghi, Alessandro
    Bertoni, Guido M.
    Breveglieri, Luca
    Pelosi, Gerardo
    Sanfilippo, Stefano
    Susella, Ruggero
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2016, 13 (01)
  • [23] Key exchange in IPSec:: Analysis of IKE
    Perlman, R
    Kaufman, C
    IEEE INTERNET COMPUTING, 2000, 4 (06) : 50 - 56
  • [24] Analysis of the IPSec key exchange standard
    Perlman, R
    Kaufman, C
    PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 150 - 156
  • [25] Diminisher: A Linux Kernel Based Countermeasure for TAA Vulnerability
    Hamza, Ameer
    Mushtaq, Maria
    Bhatti, Khurram
    Novo, David
    Bruguier, Florent
    Benoit, Pascal
    COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS, 2022, 13106 : 477 - 495
  • [26] Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN
    Kamkuemah, Martha N.
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [27] Mechanism Study of conflict analysis and countermeasure about BOT project organization
    Zhao Liku
    SUSTAINABLE CITIES DEVELOPMENT AND ENVIRONMENT, PTS 1-3, 2012, 209-211 : 1429 - 1432
  • [28] RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure
    Hajimaghsoodi, Mosayeb
    Jalili, Rasool
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2732 - 2745
  • [29] ANALYSIS OF MECHANISM OF ADRENERGIC ACTIONS ON VENTRICULAR VULNERABILITY
    PAPP, JG
    SZEKERES, L
    EUROPEAN JOURNAL OF PHARMACOLOGY, 1968, 3 (01) : 15 - &
  • [30] Refined Construction of RC4 Key Setting in WPA
    Ito, Ryoma
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 138 - 148