• Title/Summary/Keyword: WPA

Search Result 39, Processing Time 0.054 seconds

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication (NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2)

  • Tae-Young Eun;Alshihri Saad;Soo-Yong Park
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.197-208
    • /
    • 2023
  • In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.

Software Implementation of WPA Wireless LAN Access Point (소프트웨어 구현을 통한 WPA 지원 무선 랜 액세스포인트 개발)

  • 오경희;강유성;정병호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.667-669
    • /
    • 2003
  • IEEE 802.11 표준에 포함되어 있는 WEP 방식의 무선 랜 보안이 취약한 것으로 알려진 후 WEP을 대치할 새로운 표준이 802.1li 워킹그룹에 의하여 작성되고 있다. Wi-Fi는 중간단계로서 802.1li의 일부만을 구현하는 WPA 규격을 만들었다. 이 규격은 기존의 하드웨어를 그대로 사용하면서 소프트웨어와 펌웨어 갱신만으로 기존의 무선랜 취약점을 제거할 수 있게 한다. WPA규격을 준수하는 무선 랜 액세스포인트의 개발을 위하여 기존의 액세스포인트 디바이스 드라이버를 WPA를 지원하도록 수정하였으며, 사용자 인증 및 키 교환을 수행하는 소프트웨어를 설계 및 개발하였다.

  • PDF

A Secure WPA-PSK Protocol Resistant to Dictionary Attack on Smartphone Communication Using Wi-Fi Channel (Wi-Fi를 이용한 스마트폰에서 사전 공격에 안전한 WPA-PSK 프로토콜)

  • Park, Geun-Duk;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1839-1848
    • /
    • 2012
  • Recently, smartphone communications using Wi-Fi channel are increasing rapidly to provide diverse internet services. The WPA security protocol was used for data protection between user and wireless AP. However, WPA-PSK protocol was known to be weak to the dictionary attack. In this paper, we proposed a secure WPA-PSK protocol to resist the dictionary attack. Since the proposed method was designed to generate a strong encryption key which is combined the Diffie-Hellman key agreement scheme with secrecy property of PSK(Pre-Shared Key), we can protect the Wi-Fi channel from Man-In-The-Middle attack and Rogue AP impersonation attack.

A Study on Dynamic Key Management in Mixed-Mode Wireless LAN (혼합모드 무선랜에서의 동적 키 관리 방식 연구)

  • 강유성;오경희;정병호;정교일;양대헌
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.581-593
    • /
    • 2004
  • The interest in wireless LAN security is on the increase owing to a role of high-speed wireless Internet infrastructure of wireless LAN. Wi-Fi has released WPA standard in order to overcome drawbacks of WEP algorithm that is security element of current IEEE 802.11-based wireless LAN system. Pairwise key management and group key management in a mixed-mode which supports both terminals running WPA and terminals running original WEP security are very complicate. In this paper, we analyze flaws in WPA authenticator key management state machine for key distribution and propose the countermeasures to overcome the analyzed problems. Additionally, WPA authenticator key management state machine to which the solutions are applied is described. The reconstructed WPA authenticator key management state machine helps the AP perform efficiently group key exchange and group key update in the mixed-mode.

Performance Analysis of WPA(Wi-Fi Protected Access Technology) in Wired and Wireless Network (유무선 네트워크 상에서 WPA 성능 분석)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.281-284
    • /
    • 2005
  • WPA is a security service that greatly increases data protection and access control on WLANs. WPA uses TKIP that is secure algorithm of 802.11i and 802.1X/EAP authentication. It provides enhanced secure ability with the dynamic security key to correct WEP's weaknesses. In this paper, we obtain measured data transmission time that by how to create secure key of WPA in the wired and wireless network. The result shows that the delay of data transmission time was not long even if used WPA.

  • PDF

Efficient Wi-Fi Security Protocol Using Dual Tokens (이중토큰을 이용한 효율적인 Wi-Fi 보안 프로토콜)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.417-429
    • /
    • 2019
  • WPA2-PSK uses a 4-way handshake protocol based on a shared secret to establish a secure session between a client and an AP. It has various security problems such as eavesdropping attacks and the secure session establishment process is inefficient because it requires multiple interactions between client and AP. The WPA3 standard has recently been proposed to solve the security problem of WPA2, but it is a small improvement using the same 4-way handshake methodology. OAuth 2.0 token authentication is widely used on the web, which can be used to keep an authenticated state of a client for a long time by using tokens issued to an authenticated client. In this paper, we apply the dual-token based randomized token authentication technology to the Wi-Fi security protocol to achieve an efficient Wi-Fi security protocol by dividing initial authentication and secure session establishment. Once a client is authenticated and equipped with dual tokens issued by AP, it can establish secure session using them quickly with one message exchange over a non-secure channel.

A study on synthesis and mechanical properties polyurethane-acrylic hybrid resin with milk casein (Milk casein을 이용한 수용성 polyurethane-acrylic hybrid resin의 합성 및 물성 영향에 관한 연구)

  • Lee, Joo-Youb;Nam, Sang-Sung
    • Journal of the Korean Applied Science and Technology
    • /
    • v.30 no.3
    • /
    • pp.567-574
    • /
    • 2013
  • For this research, prepared water soluble milk casein resin and waterborne polyurethane-acrylic resin. Use these resin, this article has been analyzed about change of mechanical properties by increasing amount of casein resin in polyurethane-acrylic resin on coated leather. According to measure data for solvent resistance, WPA(waterborne polyurethane-acrylic resin) resin and WPA-C1, C2, C3(samples of polyurethane-acrylic resin with milk casein resin) had good property. As known in the results, increase of casein constant did not influence to big change of hybrid resin properties. As test of tensile strength, WPA had lowest tensile characteristic(1.598 $kg_f/mm^2$) and WPA-C3 had highest tensile characteristic(1.718 $kg_f/mm^2$). Also best properties of abrasion was WPA-C3(06.021 mg.loss). In elongation case, WPA had best properties(754 %) in this experiment.

Authentication based on WPA in Machine to Machine (M2M에서 WPA 기반의 인증)

  • Choi, A-Rum;Lee, Keun-Ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.221-224
    • /
    • 2010
  • 본 논문에서는 M2M에서의 WPA 기반의 인증 매커니즘을 제안하였다. 기기 간에 인증서를 배포하고 인증서를 이용하여 하나의 기기만 인증하는 것이 아닌 통신에 참여하는 기기 모두를 인증할 수 있는 매커니즘으로서 위장공격에 대한 위험위협 요소를 방어 할 수 있는 보안을 제공한다.

  • PDF

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

Performance Evaluation between Software Implementation and Hardware Implementation of WPA TKIP Algorithm in Access Points (WPA TKIP 알고리즘의 소프트웨어 구현와 하드웨어 구현의 액세스포인트 성능 비교)

  • Oh, Kyung-Hee;Kang, You-Sung;Chung, Byung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1941-1944
    • /
    • 2003
  • IEEE 802.11 표준에 포함되어 있는 WEP 방식의 무선랜 보안이 취약한 것으로 알려진 후, WEP을 대치할 새로운 표준이 802.11i 워킹그룹에 의하여 작성되고 있으며, Wi-Fi 는 중간단계로서 802.11i의 일부만을 구현하는 WPA 규격을 만들었다. WPA 규격 중 TKIP 알고리즘을 디바이스 드라이버에 소프트웨어로 구현한 액세스포인트와 펌웨어에 구현한 액세스포인트를 개발하여, 시험을 통하여 성능을 비교 분석하였다.

  • PDF