• Title/Summary/Keyword: WPA2

Search Result 21, Processing Time 0.029 seconds

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication (NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2)

  • Tae-Young Eun;Alshihri Saad;Soo-Yong Park
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.197-208
    • /
    • 2023
  • In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.

Efficient Wi-Fi Security Protocol Using Dual Tokens (이중토큰을 이용한 효율적인 Wi-Fi 보안 프로토콜)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.417-429
    • /
    • 2019
  • WPA2-PSK uses a 4-way handshake protocol based on a shared secret to establish a secure session between a client and an AP. It has various security problems such as eavesdropping attacks and the secure session establishment process is inefficient because it requires multiple interactions between client and AP. The WPA3 standard has recently been proposed to solve the security problem of WPA2, but it is a small improvement using the same 4-way handshake methodology. OAuth 2.0 token authentication is widely used on the web, which can be used to keep an authenticated state of a client for a long time by using tokens issued to an authenticated client. In this paper, we apply the dual-token based randomized token authentication technology to the Wi-Fi security protocol to achieve an efficient Wi-Fi security protocol by dividing initial authentication and secure session establishment. Once a client is authenticated and equipped with dual tokens issued by AP, it can establish secure session using them quickly with one message exchange over a non-secure channel.

A study on synthesis and mechanical properties polyurethane-acrylic hybrid resin with milk casein (Milk casein을 이용한 수용성 polyurethane-acrylic hybrid resin의 합성 및 물성 영향에 관한 연구)

  • Lee, Joo-Youb;Nam, Sang-Sung
    • Journal of the Korean Applied Science and Technology
    • /
    • v.30 no.3
    • /
    • pp.567-574
    • /
    • 2013
  • For this research, prepared water soluble milk casein resin and waterborne polyurethane-acrylic resin. Use these resin, this article has been analyzed about change of mechanical properties by increasing amount of casein resin in polyurethane-acrylic resin on coated leather. According to measure data for solvent resistance, WPA(waterborne polyurethane-acrylic resin) resin and WPA-C1, C2, C3(samples of polyurethane-acrylic resin with milk casein resin) had good property. As known in the results, increase of casein constant did not influence to big change of hybrid resin properties. As test of tensile strength, WPA had lowest tensile characteristic(1.598 $kg_f/mm^2$) and WPA-C3 had highest tensile characteristic(1.718 $kg_f/mm^2$). Also best properties of abrasion was WPA-C3(06.021 mg.loss). In elongation case, WPA had best properties(754 %) in this experiment.

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

Authentication based on WPA in Machine to Machine (M2M에서 WPA 기반의 인증)

  • Choi, A-Rum;Lee, Keun-Ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.221-224
    • /
    • 2010
  • 본 논문에서는 M2M에서의 WPA 기반의 인증 매커니즘을 제안하였다. 기기 간에 인증서를 배포하고 인증서를 이용하여 하나의 기기만 인증하는 것이 아닌 통신에 참여하는 기기 모두를 인증할 수 있는 매커니즘으로서 위장공격에 대한 위험위협 요소를 방어 할 수 있는 보안을 제공한다.

  • PDF

Design of Wi-Fi P2P Connection Manager Using wpa_supplicant (wpa_supplicant를 이용한 Wi-Fi P2P용 커넥션 매니저 설계)

  • Yun, Min-Hong;Kim, Do-Hyung;Ryu, Cheol;Lee, Jae-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.280-282
    • /
    • 2012
  • Wi-Fi P2P는 Wi-Fi Alliance에 의해 제정된 표준 규격으로 근접 거리에 위치한 장치들간의 효율적이고 빠른 데이터 송수신을 위해 IEEE 802.11n을 이용하고 있다. 근접거리 통신을 위한 기존 블루투스 등의 규격이 갖는 단점을 보완했다는 점에 있어 높은 평가를 받고 있으며, 모바일 디바이스용 플랫폼인 Android ICS 버전부터 공식적으로 지원됨에 따라 널리 사용될 것으로 전망된다. 한편, 한국전자통신연구원(ETRI)에서는 오랫동안 PAN 수준의 네트워킹을 연구해왔으며 그 일환으로 PAN 및 M2M에 적합한 통신 수단으로 여겨지는 Wi-Fi P2P에 대한 연구도 진행 중에 있다. 이에 본 논문에서는 ETRI가 과제를 수행하면서 부수적으로 연구한 Wi-Fi P2P를 위한 Linux용 플랫폼 구조를 공유하고자 한다. 특히 Linux Wireless 프로젝트인 hostap에 속한 wpa_supplicant를 이용해 실제로 동작하는 Wi-Fi P2P 커넥션 매니저를 설계하고 구현하는 방법을 설명함으로써 Android 플랫폼이 아닌 일반적인 Linux 장치에서 Wi-Fi P2P를 사용할 수 있는 방법에 대해 논한다.

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.194-202
    • /
    • 2022
  • The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.

A Study on Vulnerability Analysis and Security Plan through Public WiFi Attack (공공 와이파이 공격을 통한 취약점 분석 및 보안방안에 관한 연구)

  • Cho, Young-nam;Jo, Jeong-won;Jeong, Chae-eun;Kang, Da-seul;Jang, Won-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.493-496
    • /
    • 2018
  • Wi-Fi Protected Access2 (WPA2), a recommended Wi-Fi communication security technology, vulnerabilities are found and Users' personal information may also be exposed. In this paper, we analyze security vulnerabilities of public Wi-Fi by attack and seek to find ways to securely use Wi - Fi by users.

  • PDF

Secured Network Design for Hyper Market by applying MACsec(802.1AE) Protocol (MACsec(802.1AE) 프로토콜 기반 대형마켓 보안 네트워크 설계)

  • Lee, Jun-Won;Park, Seon-Ho;Gum, Ki-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.804-807
    • /
    • 2010
  • 네트워크를 통해 고객의 신용카드 및 매출정보를 전송하는 대형마켓의 경우, 데이터링크 레이어 보안은 매우 중요하다. 본 논문은 현재 WPA/WPA2 형태로 무선 네트워크에 국한되어 있는 데이터링크 레이어 보안수준을 MACsec(IEEE 802.11AE)를 이용하여 전체 데이터링크 레이어 구간으로 확대하고, 나아가 SecY(MAC Security Entity)의 Secure Frame의 처리 방식을 응용한 무선랜 인증방안을 제시하고자 한다.

A Porting Technique of WiFi Device on Android Platform (안드로이드 플랫폼에 WiFi 디바이스 탑재 기법)

  • Jeong, Uyeong;Ju, Youngkwan;Jeon, Joongnam
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2012
  • Android platform is a powerful operating system developed on Linux 2.6 Kernel, and provides many features such as comprehensive libraries, a multimedia environment, and powerful interface for phone applications. Since Android is an open operating system, which can be installed in any vendors's equipments. Current smartphones as well as netbooks, navigations, car PCs, tablet PCs, Industrial PCs are used in various fields. It is difficult a lot that to mount to other devices on the Android platform or new devices. In this Paper, The process that data that occurred from a hardware was passed to the highest application and Android platform system for managing hardware devices were analyzed. Building Android & driver compilation environment, How to support the protocol for the use of WiFi in the kernel, How to Mount a WiFi device in the kernel, Device driver registration for the Android platform, WiFi Management Service Daemon (wpa_supplicant) and IP allocation services daemon (dhcpcd) registration, How to create a socket for communication between the daemon (wpa_supplicant) and HAL have been presented. In the experiment using the proposed method, WiFi devices were mounted on the Android platform in the X-86 & ARM family. Understanding the whole process of control flow in Android hierarchy is very important to porting a new device on it. The process included in this paper can help technicians who might encounter the obstacles in their porting works.

  • PDF