8 research outputs found
Key Agreement
WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi alliance to secure wireless networks. The alliance defined the protocol in response to several weaknesses researchers had found in the previous Wired Equivalent Privacy (WEP) system. Many sophisticated authentication and encryption techniques have been embedded into WPA but it is still facing a lot of challenging situations. In this paper we discuss the vulnerabilit
WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis
WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi Alliance to secure wireless networks. The Alliance defined the protocol in response to several weaknesses researchers had found in the previous system: Wired Equivalent Privacy (WEP). Many sophisticated authentication and encryption techniques have been embedded into WPA2 but it still facing a lot of challenging situations. In this paper we discuss the benefit of WPA2, its vulnerabilit
Secure Authentication
Many complicated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows that, GTEK Hash chain algorithm for Multi and Broadcast service of IEEE 802.16e facing a reduced forward secrecy problem. These vulnerabilities are the possibilities to forge key messages in Multiand Broadcast operation, which are susceptible to forgery and reveals important management information. In this paper, we also propose three UAKE protocols with PFS (Perfect Forward Secrecy) that are efficient and practical for mobile devices
IEEE 802.16e Security Vulnerability : Analysis & Solution
Data security has become a major issue in most network protocols. For wireless system, security support is even more important to protect
the users as well as the network. Due to this importance, different protocol were designed & deployed with network standards in order to add the security.
The security sub layer of IEEE 802.16 employs an authenticated client/server key management protocol in which the B.S, the serve, control the distribution of
keying materials to the client M.S. This paper analyzes the physical layer threat & MAC layer threat of WiMAX .First give an overview of security
architecture of mobile WiMAX network, then investigate different security vulnerability & gives possible solution to overcome them. These lnerabilities are
the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted
management communication which reveal important management information. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as
eliminate existing weakness in original DH key exchange protocol. Also RSA & Elliptic curve Diffie Hellman key agreement algorithm are discuss which can be used to generate symmetric key between M.S & B.S. Several one way function are presented by using cryptography, which can be used to solve shared key
vulnerability in Multi-&Broadcast service. We find the initial network procedure is not effectively secured that makes Manin- the-middle attacks & Denial of service attack possible