Security Analysis and Improvements on WLANs
نویسندگان
چکیده
IEEE 802.11i standard defines the security specifications of IEEE 802.11 series Wireless Local Area Network (WLAN). It is the replacement of the old security standard named Wired Equivalent Privacy (WEP), and it aims to eliminate all known attacks against WEP. It certainly provides solutions to the confidentiality, mutual authentication and integrity aspects of the WLAN security but not the availability aspect. Many researchers have shown that IEEE 802.11i standard cannot prevent various Denial of Service (DoS) attacks including de-authentication, disassociation and memory/CPU DoS attacks. Besides, IEEE 802.11i has reserved the pre-shared key (PSK) mode of WEP for flexibility and backward compatibility. However, the PSK mode in IEEE 802.11i standard fails to provide sufficient security to prevent offline dictionary attacks and internal attacks. In this paper, we present our solutions that can effectively improve the security of IEEE 802.11i. For memory/CPU DoS attack against 4-way Handshake protocol, we propose an alternative Enhanced 3-way Handshake protocol which can effectively prevent this attack and can save computation cost compared to the original one. For the vulnerability in PSK mode, we proposed a novel Elliptic curve Diffie–Hellman (ECDH) protocol to prevent the offline dictionary attacks and internal attacks. The formal proofs of above two proposed protocols are also provided using Protocol Composition
منابع مشابه
VoIPiggy: Implementation and evaluation of a mechanism to boost voice capacity in 802.11 WLANs
Supporting voice traffic in existing WLANs results extremely inefficient, given the large overheads of the protocol operation and the need to prioritize this traffic over, e.g., bulky transfers. In this thesis we propose a simple scheme to improve the efficiency of WLANs when voice traffic is present. The mechanism is based on piggybacking voice frames from one direction of the voice call over ...
متن کاملEvolution of Wireless LAN Security Standards
As wireless LANs (WLANs) become ubiquitous, the issue of network security in the wireless domain becomes one of crucial interest. In response to security concerns, the IEEE standard 802.11 proposed a protocol known as Wired Equivalent Privacy (WEP). However, the discovery of serious loopholes in WEP had a negative impact on the deployment of WLANs for corporate networks, and possibly on the gro...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملSecurity in Wireless Local Area Networks
Over the last years, wireless local area networks (WLANs) have experienced a tremendous growth, becoming an integral part of enterprises, homes and other businesses. One of the most important issues in the development of WLANs is providing a secure communication. Because of the broadcast nature of the wireless communication, it becomes easy for an attacker to intercept the signal or to disturb ...
متن کاملToday & Tomorrow: IEEE 802.11 WLAN Security
After all those enhancements in Internet technology, the Internet has become part of people’s lives, so they want to have it ready to use not only on their PCs but also in their mobile devices. WLANs have become very popular thanks to the development of IEEE 802.11 standard family. As wireless applications and systems are widely adopted wireless security is becoming increasingly important. Wire...
متن کاملImpact of New Highly Secure Scheme on Wireless Network 802.11 Performance
Wireless local area networks (WLAN) are beginning to play a much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes for hackers and thieves to abuse, that is finally being addressed by stronger security protocols and these security protocols include Wired Equivalent Privacy ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JNW
دوره 6 شماره
صفحات -
تاریخ انتشار 2011