• Title/Summary/Keyword: 4-Way Handshake

Search Result 24, Processing Time 0.029 seconds

A Study on Improvement of Mechanism for Secure Handoff in Wireless Networks (무선랜 환경에서 안전한 핸드오프를 위한 메커니즘 개선에 관한 연구)

  • Cho, Ji-Hoon;Jeon, Joon-Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1047-1055
    • /
    • 2005
  • One of major characteristics in wireless LAN is terminal's frequent mobility, so it makes many overheads in the process of authentications repeatedly at each handoffs. So I propose IAPP(Inter Access Point Protocol) of IEEE 802.11f, modified context block and 4 way handshake of IEEE 802.11i, in order to implement secure and rapid handoff. The context block. I proposed, doesn't makes any communication with RADIUS server at handoff period. Therefore, it guarantee higher efficiency than existing handoff mechanisms. Also it can improve security vulnerability by padding authentication field in the context block for providing in advance against Replay and DoS(Denial of Service) attacks.

Performance comparison of wireless MAC protocols for wireless LANs in the radio channel with rayleigh fading, shadowing and near-far effects (Rayleigh 페이딩, 차폐현상 및 Near-far현상을 고려한 무선 채널에서의 무선 LAN용 매체접근제어 프로토콜 성능비교)

  • 김재현;신형철;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.1843-1853
    • /
    • 1997
  • The channel throughput and packet delay of wireless media control (MAC) protocols with Rayleigh fading, log-normal shoadowing and near-far effects are analyzed. We consider CSMA/CA protocols as the wireless MAC protocols, since CSMA/CA protocols are based on the standard for wireless Local Area Networks (LANs) IEEE 802. 11. We have found that the performance of CSMA/CA in radion channel model is reduced above 50% than those of error free channel model in low traffic load. We also found that 4-Way Handshake CSMA/CA protocol is supterior to the other CSMA/CA protocols in high traffic load.

  • PDF

A Performance Analysis of DFWMAC Protocols in Short-Distance Wireless Data Transmission Using Military Radio (군용 무전기를 이용한 근거리 무선 데이터 전송에서의 분산 매체 접근 제어 방식의 성능 분석)

  • 이성규;최영윤
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.2
    • /
    • pp.117-130
    • /
    • 1999
  • In this paper, the performance of data communication function of military radio equipment P-999K is analyzed based on the standard CSMA/CA protocol which is DFWMAC standard protocol done by IEEE802.11 work group. Basic three standard protocols, i.e. Basic CSMA/CA, Stop & Wait ARQ and 4-Way Handshake CSMA/CA protocols are analyzed and compared with each other under the hidden terminal environment. The computer simulation is also done by using SIMSCRIPT II.5 which is popular software tool for an independent processing. The results show that p-persistent(with p=0.3) CSMA scheme is superior to non-persistent CSMA scheme with non-hidden terminal condition, but the performances of both schemes are almost same with hidden terminal situation. And the results of computer simulations are also showed that Basic CSMA/CA protocol is superior to the other protocols when the ratio of hidden terminals is below 10 % of total user population, however, with the above 20% hidden terminals environment and the higher offered traffic conditions the 4-Way Handshake CSMA/CA protocol shows the most superior performance.

  • PDF

Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN (무선 랜 환경 인증 메커니즘의 취약성 분석 및 대응방안 연구)

  • Choi, Jin-Ho;Oh, Soohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1219-1230
    • /
    • 2012
  • Recently, lots of users are using wireless LAN providing authentication and confidentiality with security mechanism such as WEP, WPA. But, weakness of each security mechanism was discovered and attack methods that user's information was exposed or modified to the third parties with it and abused by them were suggested. In this paper, we analyzed architecture of security mechanisms in wireless LAN and performed PSK cracking attack and cookie session hijacking attack with the known vulnerability. And, an improved 4-way handshake mechanism which can counter PSK cracking attack and a cookie replay detection mechanism which can prevent cookie session hijacking attack were proposed. Proposed mechanisms are expected to apply to establish more secure wireless LAN environment by countering existing vulnerability.

Efficient Wi-Fi Security Protocol Using Dual Tokens (이중토큰을 이용한 효율적인 Wi-Fi 보안 프로토콜)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.417-429
    • /
    • 2019
  • WPA2-PSK uses a 4-way handshake protocol based on a shared secret to establish a secure session between a client and an AP. It has various security problems such as eavesdropping attacks and the secure session establishment process is inefficient because it requires multiple interactions between client and AP. The WPA3 standard has recently been proposed to solve the security problem of WPA2, but it is a small improvement using the same 4-way handshake methodology. OAuth 2.0 token authentication is widely used on the web, which can be used to keep an authenticated state of a client for a long time by using tokens issued to an authenticated client. In this paper, we apply the dual-token based randomized token authentication technology to the Wi-Fi security protocol to achieve an efficient Wi-Fi security protocol by dividing initial authentication and secure session establishment. Once a client is authenticated and equipped with dual tokens issued by AP, it can establish secure session using them quickly with one message exchange over a non-secure channel.

Session Key Distribution Scheme in V2I of VANET using Identity-Based Cryptography (VANET의 V2I 환경에서 IBC를 이용한 세션키 분배 기법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.1
    • /
    • pp.112-120
    • /
    • 2009
  • This paper proposes a session key distribution scheme on non-interactive key distribution algorithm of Identity-based cryptography in V2I of VANET. In the current VANET, IEEE 802.11i is used to provide secure data communication between the vehicle and infrastructure. However, since the 4-way handshake procedure reply when the vehicle handover to another RSU/AP, IEEE 802.11i increases the communication overhead and latency. The proposed scheme using non-interactive key distribution algorithm of Identity-based cryptography provided session key generation and exchange without message exchange and reduced communication overhead and latency than the IEEE 802.11i.

A Design of Authentication/Security Processor IP for Wireless USB (무선 USB 인증/보안용 프로세서 IP 설계)

  • Yang, Hyun-Chang;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2031-2038
    • /
    • 2008
  • A small-area and high-speed authentication/security processor (WUSB_Sec) IP is designed, which performs the 4-way handshake protocol for authentication between host and device, and data encryption/decryption of wireless USB system. The PRF-256 and PRF-64 are implemented by CCM (Counter mode with CBC-MAC) operation, and the CCM is designed with two AES (Advanced Encryption Standard) encryption coles working concurrently for parallel processing of CBC mode and CTR mode operations. The AES core that is an essential block of the WUSB_Sec processor is designed by applying composite field arithmetic on AF$(((2^2)^2)^2)$. Also, S-Box sharing between SubByte block and key scheduler block reduces the gate count by 10%. The designed WUSB_Sec processor has 25,000 gates and the estimated throughput rate is about 480Mbps at 120MHz clock frequency.

WLAN Security Access Protocol for Rapid Initial Link Setup Process (신속한 초기 링크 셋업 과정을 위한 WLAN 보안 접속 프로토콜)

  • Kim, Min-Hee;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1515-1523
    • /
    • 2015
  • It has been prevalent to be serviced through WLAN(Wireless Local Area Network) as a variety of mobile devices have been introduced. If the number of mobile devices increases rapidly for the network access in a limited range of ESS(Extended Service Set), a lengthy connection delays are induced due to the initial link setup process of the IEEE 802.11i which is WLAN security standard. In this paper, we propose a new initial link setup protocol which can be executed in the ESS area of WLAN.

A Ticket-based Authentication Mechanism Suitable for Fast 802.11 Handoff which use CAPWAP Architecture (고속의 802.11 핸드오프를 지원하는 CAPWAP 아키텍처를 이용한 티켓 기반의 인증 메커니즘)

  • Park, Chang-Seop;Woo, Byung-Duk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.93-103
    • /
    • 2009
  • Recently, there is an increase in demand of real-time multimedia service in the WLAN environment, with a commercialization of IEEE 802.11n standard. However, the 802.1x authentication protocol is too slow to provide seamless real-time multimedia service, which defined in an IEEE 802.11i security standard. In this paper, a Ticket-based authentication mechanism in the CAPWAP(Control And Provisioning Wireless Access Point) architecture is introduced to support for the fast handoff.

A four-way handshake for reliable key exchange mechanism (신뢰성 있는 키 교환을 위한 4 단계 핸드셰이크 연결 메커니즘)

  • Song, Tae ill;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.969-972
    • /
    • 2010
  • 유 무선의 망을 함께 사용하는 무선 단말기에서는 기존의 통신방법으로는 안전하지 못한 네트워크 환경에서의 메시지 교환의 무결성을 입증하기 어렵다. 기존 논문에서 제시한 인증메시지를 이용한 신뢰성 있는 키 교환에서는 안전하지 못한 네트워크 환경에서의 신뢰성있는 키 교환이 가능하나, 상대적으로 많은 메시지 교환 절차와 암호화로 무선단말기와 서버 사이의 통신에 단점을 가지고 있다. 본 논문은 안전하지 못한 네트워크 환경에서의 무선 단말기와 유선 서버사이의 신뢰성 있는 키 교환을 위해 상호 연결을 맺는 과정을 제시한다. 제안된 논문은 연결 요청단계, 인증 메시지 교환단계, 홉 카운팅 단계, 신뢰성 확인단계로 구성되어 있다. 연결 요청단계에서는 서버와 클라이언트 사이의 연결 요청이 이루어지며, 인증 메시지 교환단계는 인증 메시지를 이용해 상호간의 신뢰성 확인 및 Seed 값의 분배를 실시한다. 홉 카운팅 단계에서는 패킷의 TTL(Time to live)를 이용하여 메시지의 변조여부를 확인하며, 신뢰성 확인 단계는 카운팅된 값으로 메시지의 신뢰성여부를 판단하는 단계로 구성된다.