Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol

Ghanem, Mohamed Chahine and Ratnayake, Deepthi N. (2016) Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol. In: 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), 13-14 June 2016, London.

[img]
Preview
Text
Enhancing_WPA2-PSK_four-way_handshaking_after_re-authentication_to_deal_with_de-authentication_followed_by_brute-force_attack_a_novel_re-authentication_protocol.pdf - Accepted Version

Download (1MB) | Preview
Official URL: https://ieeexplore.ieee.org/abstract/document/7503...

Abstract / Description

The nature of wireless network transmission and the emerging attacks are continuously creating or exploiting more vulnerabilities. Despite the fact that the security mechanisms and protocols are constantly upgraded and enhanced, the Small Office/Home Office (SOHO) environments that cannot afford a separate authentication system, and generally adopt the IEEE 802.11 Wi-Fi-Protected-Access-2/Pre-Shared-Key (WPA2-PSK) are still exposed to some attack categories such as de-authentication attacks that aim to push wireless client to re-authenticate to the Access Point (AP) and try to capture the keys exchanged during the handshake to compromise the network security. This kind of attack is impossible to detect or prevent in spite of having an Intrusion Detection and Prevention System (IDPS) installed on the client or on the AP, especially when the attack is not repetitive and is targeting only one client. This paper proposes a novel method which can mitigate and eliminate the risk of exposing the PSK to be captured during the re-authentication process by introducing a novel re-authentication protocol relying on an enhanced four-way handshake which does not require any hardware upgrade or heavy-weight cryptography affecting the network flexibility and performances.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Monitoring, Portable computers, Random access memory, Ferroelectric films, Nonvolatile memory, Cryptography
Subjects: 000 Computer science, information & general works
Department: School of Computing and Digital Media
Depositing User: Mohamed Ghanem
Date Deposited: 12 Feb 2024 11:10
Last Modified: 12 Feb 2024 11:47
URI: https://repository.londonmet.ac.uk/id/eprint/9144

Downloads

Downloads per month over past year



Downloads each year

Actions (login required)

View Item View Item