8 research outputs found

    Key Agreement

    Get PDF
    WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi alliance to secure wireless networks. The alliance defined the protocol in response to several weaknesses researchers had found in the previous Wired Equivalent Privacy (WEP) system. Many sophisticated authentication and encryption techniques have been embedded into WPA but it is still facing a lot of challenging situations. In this paper we discuss the vulnerabilit

    WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis

    Get PDF
    WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi Alliance to secure wireless networks. The Alliance defined the protocol in response to several weaknesses researchers had found in the previous system: Wired Equivalent Privacy (WEP). Many sophisticated authentication and encryption techniques have been embedded into WPA2 but it still facing a lot of challenging situations. In this paper we discuss the benefit of WPA2, its vulnerabilit

    Secure Authentication

    Get PDF
    Many complicated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows that, GTEK Hash chain algorithm for Multi and Broadcast service of IEEE 802.16e facing a reduced forward secrecy problem. These vulnerabilities are the possibilities to forge key messages in Multiand Broadcast operation, which are susceptible to forgery and reveals important management information. In this paper, we also propose three UAKE protocols with PFS (Perfect Forward Secrecy) that are efficient and practical for mobile devices

    IEEE 802.16e Security Vulnerability : Analysis & Solution

    Get PDF
    Data security has become a major issue in most network protocols. For wireless system, security support is even more important to protect the users as well as the network. Due to this importance, different protocol were designed & deployed with network standards in order to add the security. The security sub layer of IEEE 802.16 employs an authenticated client/server key management protocol in which the B.S, the serve, control the distribution of keying materials to the client M.S. This paper analyzes the physical layer threat & MAC layer threat of WiMAX .First give an overview of security architecture of mobile WiMAX network, then investigate different security vulnerability & gives possible solution to overcome them. These lnerabilities are the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted management communication which reveal important management information. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as eliminate existing weakness in original DH key exchange protocol. Also RSA & Elliptic curve Diffie Hellman key agreement algorithm are discuss which can be used to generate symmetric key between M.S & B.S. Several one way function are presented by using cryptography, which can be used to solve shared key vulnerability in Multi-&Broadcast service. We find the initial network procedure is not effectively secured that makes Manin- the-middle attacks & Denial of service attack possible
    corecore