Browse > Article
http://dx.doi.org/10.13089/JKIISC.2012.22.6.1219

Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN  

Choi, Jin-Ho (Korea Security Evaluation Laboratory Co., Ltd.)
Oh, Soohyun (Hoseo University)
Abstract
Recently, lots of users are using wireless LAN providing authentication and confidentiality with security mechanism such as WEP, WPA. But, weakness of each security mechanism was discovered and attack methods that user's information was exposed or modified to the third parties with it and abused by them were suggested. In this paper, we analyzed architecture of security mechanisms in wireless LAN and performed PSK cracking attack and cookie session hijacking attack with the known vulnerability. And, an improved 4-way handshake mechanism which can counter PSK cracking attack and a cookie replay detection mechanism which can prevent cookie session hijacking attack were proposed. Proposed mechanisms are expected to apply to establish more secure wireless LAN environment by countering existing vulnerability.
Keywords
WEP; WPA; PSK Cracking; Session Hijacking;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://www.aircrack-ng.org/
2 http://www.backtrack-linux.org/
3 http://droidsheep.de/
4 Vivek Ramachandran, "BackTrack 5 Wireless Penetration Testing," Packt Publishing Ltd, Sep. 2011.
5 J. R. Walker. "Unsafe at any key size; an analysis of the WEP encapsulation", IEEE Document 802.11-00/362, Oct. 2000.
6 IEEE, "Standard for Local and metropolitan area networks- Port-Based Network Access Control," IEEE Std 802.1X, June 2001.
7 IEEE, "IEEE 802.11n: Wireless LAN medium access control(MAC) and physical layer (PHY) specification : enhancements for higher throughput," IEEE Std 802.11n, Sep. 2006.
8 LAN Medium Access Control(MAC) and Physical Layer(PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements, "IEEE Std 802.11i, July 2004.
9 IEEE, "IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems- Local and Metropolitan Area Networks-Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," 2007
10 Brad Heins, "해킹 초보를 위한 무선 네트워크 공격과 방어," 에이콘출판사, pp.21-52, 2011, 7월
11 Jon Erickson, "해킹: 공격의 예술," 에이콘출판 사, pp.470-483 , 2004년 5월
12 국제전기통신연합, "Password-authenticated key exchange(PAK) protocol", ITU-T Recommendation X.1035, Feb. 2007.
13 한국인터넷진흥원, "2011년 무선인터넷이용실태 조사," pp.4-28, 2011년 12월
14 윤종호, "무선 LAN 보안 프로토콜," 교학사, pp.-155-183, 2005년 8월
15 윤종호, "윈도우 서버와 프로토콜 분석기를 활용한 네트워크 보안 프로그램," 교학사, pp. 31-57, 2004년 10월