DOI QR코드

DOI QR Code

NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication

  • 은태영 (서강대학교 컴퓨터공학과 ) ;
  • ;
  • 박수용 (서강대학교 컴퓨터공학부)
  • 투고 : 2022.10.31
  • 심사 : 2022.12.22
  • 발행 : 2023.06.30

초록

다가오는 미래에는 인터넷을 사용하는 사람이라면 누구나 NFT를 1개 이상 가지게 될 것이다. NFT는 FT와는 다르게 소유자를 명시할 수 있고, FT에 비해 추적관리도 용이하다. 2022년의 조사에서도 현재까지 전 세계적으로 가장 많이 사용되고 있는 무선 프로토콜은 WPA2이다. 2006년에 나온 프로토콜인 만큼 현시점에서는 다양한 취약점이 존재하는 프로토콜이다. 취약점을 보완하기 위해 2018년에 새로 나온 WPA3나 기존의 WPA2를 강화한 WPA2-EAP를 사용하기 위해선 접속하는 기기인 STA(스테이션)과 AP(액세스포인트, 공유기)에 추가적인 장비 업그레이드가 필요하다. 고가의 라우터 장비를 사용하면 보안적인 부분은 해결되지만 SOHO(Small Office Home Office)에서 도입하기엔 경제적인 비효율성이 있다. 본 논문에서는 NFT를 인증 수단으로 사용하여 기존의 WPA2를 그대로 사용하고 장비적인 업그레이드를 하지 않으면서 현재까지 널리 사용되고 있는 크랙 툴들을 방어하며 기존 WPA2와 비교해서도 실제로 SOHO에서 사용하는데 무리가 없음을 보였다.

In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.

키워드

과제정보

본 연구는 과학기술정보통신부 및 정보통신기획평가원의 대학ICT연구센터 지원사업의 연구결과로 수행되었음(IITP-2022-2017-0-01628*).

참고문헌

  1. D. J. Feher and B. Sandor, "Effects of the WPA2 KRACK attack in real environment," IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY). 2018.
  2. V. O. Etta, A. Sari, A. L. Imoize, P. K. Shukla, and M. Alhassan, "Assessment and Test-case Study of Wi-Fi Security through the Wardriving Technique," Article in Mobile Information Systems. 2022.
  3. T. Eun and S. Park, "Introduction to attack methods of locally accessible private blockchain," Korea Computer Congress 2022 (KCC 2023), pp.1276-1278, 2022.
  4. S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," [Internet], https://assets.pubpub.org/d8wct41f/31611263538139.pdf, 2008.
  5. V. Buterin. "A next generation smart contract & decentralized application platform," [Internet], https://ethereum.org/669c9e2e2027310b6b3cdce6e1c52962/Ethereum_Whitepaper_-_Buterin_2014.pdf, 2013.
  6. E. Baray and N. Kimar Ojha. "WLAN security protocols and WPA3 security approach measurement through aircrack-ng technique," International Conference on Computing Methodologies and Communication (ICCMC). 2021.
  7. L. G. Nikolov, "Wireless network vulnerabilities estimation," Security & Future, Vol.2, No.2, pp.80-82, 2018.
  8. C. D. Omorog, B. D. Gerardo, and R. P. Medina. "The performance of blum-blum-shub elliptic curve pseudorandom number generator as WiFi protected access 2 security key generator," Proceedings of the 2nd International Conference on Business and Information Management (ICBIM), 2018.
  9. J. Guo, M. Wang, H. Zhang, and Y. Zhang, "A secure session key negotiation scheme in WPA2-PSK networks," IEEE Wireless Communications and Networking Conference (WCNC), 2020.
  10. V. L. L. Thing, "IEEE 802.11 network anomaly detection and attack classification: A deep learning approach," IEEE Wireless Communications and Networking Conference (WCNC), 2017.
  11. U. Chatterjee, R. Sadhukhan, D. Mukhopadhyay, R. Chakraborty, D. Mahata, and M. Pranhu, "Stupify: A hardware countermeasure of KRACKs in WPA2 using physically unclonable functions," Companion Proceedings of the Web Conference 2020, 2020.
  12. Y. Niu, L. Wei, C. Zhang, J. Liu, and Y. Fang, "An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain," IEEE/CIC International Conference on Communications in China (ICCC), 2017.
  13. Wi-Fi Alliance, "WPA3 AND ENHANCED OPEN: NEXT GENERATION WI-FI SECURITY," ARUBA [Internet], https://www.arubanetworks.com/assets/wp/WP_WPA3-Enhanced-Open.pdf, 2018.
  14. Weyl, Eric Glen and Ohlhaver, Puja and Buterin, Vitalik. "Decentralized Society: Finding Web3's Soul," Social Science Research Network (SSRN) [Internet], https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4105763, 2022.