Pre-shared Key Agreement for Secure Public Wi-Fi

نویسندگان

  • Seokseong Jeon
  • Chansu Yu
  • Young-Joo Suh
چکیده

This paper presents a novel pre-shared key (PSK) agreement scheme to establish a secure connection between a Wi-Fi client and access point (AP) without prior knowledge of a password. The standard IEEE 802.11 security method, Robust Security Network Association, widely known as Wi-Fi Protected Access (WPA) and WPA2, derives a shared cryptographic key if and only if a user provides an identical password which an AP possesses, causing of inconvenience of obtaining and entering the password. In this paper, a proposed scheme, Secure Open AP (SOAP), adopts two public key algorithms, the elliptic curve Diffie-Hellman key exchange algorithm (ECDH) and digital signature algorithm (ECDSA) to establish a secure connection between a client and an AP without having prior knowledge of a password. Implementation and experiment results demonstrate the viability of the proposed scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wi Fi Protected Access-Pre-Shared Key Hybrid Algorithm

Potentially large number of cryptography solutions to attain security is widely known and recognized. Looking for a stronger scheme is the aim of most researchers to hide valuable information from each other. In this information age, many encryption algorithm exist to help keep information secure and these algorithms vary in complexity and ability to resist cracking. In this paper we present a ...

متن کامل

Secure Location-Aided Routing Protocols With Wi-Fi Direct For Vehicular Ad Hoc Networks

Secure routing protocols are proposed for the vehicular ad hoc networks. The protocols integrate the security authentication process with the Location-Aided Routing (LAR) protocol to support Wi-Fi Direct communications between the vehicles. The methods are robust against various security threats. The security authentication process adopts a modified DiffieHellman key agreement protocol. The Dif...

متن کامل

A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control

Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi net...

متن کامل

Usability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots

Passwords have to be secure and usable at the same time, a trade-off that is long known. There are many approaches to avoid this trade-off, e.g., to advice users on generating strong passwords and to reject user passwords that are weak. The same usability/security trade-off arises in scenarios where passwords are generated by machines but exchanged by humans, as is the case in pre-shared key (P...

متن کامل

Using Model-Checking to Reveal a Vulnerability of Tamper-Evident Pairing

Wi-Fi Protected Setup is an attempt to simplify configuration of security settings for Wi-Fi networks. It offers, among other methods, Push-Button Configuration (PBC) for devices with a limited userinterface. There are however some security issues in PBC. A solution to these issues was proposed in the form of Tamper-Evident Pairing (TEP). TEP is based on the Tamper-Evident Announcement (TEA), i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1711.02293  شماره 

صفحات  -

تاریخ انتشار 2017