Abstract
The significance of wireless devices has been growing day by day. Performance and security are an essential issue, leading to more trustworthy and effective communications. IEEE 802.11i is the most updated security protocol for wireless LAN. Authentication and Key management is a major portion of a secure wireless communication. An IEEE 802.11i usage the IEEE 802.1X standard for authentication; and for key management and distribution, Four-way handshake protocol is used. Research has presented that there are various security concerns associated with the authentic IEEE 802.11i authentication protocol. The most severe of these security concerns is the key recapture attack, during which attackers are able to recover the secret key and use it to get access to a targeted network. In order to alleviate this severe security susceptibility, the aim of this paper is to investigate those vulnerabilities and enhance the IEEE 802.11i standard by presenting a substitute enhanced three-way handshake authentication protocol which can efficiently forestall the key recapture attack. In addition, this technique reduces the memory overheads and computation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
W. Liu, H. Duan, P. Ren, and J. Wu, “Weakness analysis and attack test for WLAN,” International Conference on Green Circuits and Systems (ICGCS), pp. 387–391, June 2010.
Changhua He, John C. Mitchell, “Analysis of the 802.11i 4-way handshake,” Proceedings of the 3rd ACM workshop on Wireless security, pp. 43–50, 2004.
Xinghua Li, Jianfeng Ma, Shen Yulong, An efficient WLAN initial access authentication protocol, Global Communications Conference (GLOBECOM), pp. 1035–1040, 2012.
Xinghua Li, Fenye Bao, Shuxin Li, Jianfeng Ma, “FLAP: An Efficient WLAN Initial Access Authentication Protocol,” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, Issue 2, pp. 488–497, 2013.
Jafri, A. Izani, and Y. Li, “ANonce encryption in 802.11i 4-way handshake protocol,” 7th International Conference on Advances in Mobile Computing and Multimedia, pp. 475–480, Dec. 2009.
Ahmed, Idris and Anne James, “ESKIMO 2-Way Handshake,” 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 437–441, Aug. 2013.
J. Liu, X. Ye, J. Zhang, and J. Li, “Security verification of 802.11i 4-Way handshake protocol,” 2008 IEEE International Conference on Communications, pp. 1642–1647, May 2008.
J. Liu, X. Ye, J. Zhang, J. Li, “Security Verification of 802.11i 4-Way Handshake Protocol,” IEEE International Conference on Communications, pp. 1642–1647, 2008.
Snehasish Parhi, “Attacks Due to Flaw of Protocols Used in Network Access Control (NAC), Their Solutions and Issues: A Survey,” International Journal of Computer Network and Information Security (IJCNIS), Vol. 4, No. 3, pp. 31–46, 2012.
Xiaodong Zha, Maode Ma, “Security improvements of IEEE 802.11i 4-way handshake scheme,” IEEE International Conference on Communication Systems (ICCS), pp. 667–671, 2010.
Xiaodong Zha, Maode Ma, “Security improvements of IEEE 802.11i 4-way handshake scheme,” IEEE International Conference on Communication Systems, pp. 667–671, Nov. 2010.
R. Jani and S. Jani, “Multiple Packet System: A Security Approach for Wireless Networks”, International Journal of Advanced Research in Computer Science, Vol. 4, No. 3, pp. 200–203, 2013.
P. Kumar et al., “Encryption using DES of ANonce in 4-Way Handshake Protocol for Authentication in Wpa2,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 10, pp. 552–557, 2013.
S. H. Eum et al., “A Secure 4‐Way Handshake in 802.11i Using Cookies,” International Journal of Principles and Applications of Information Science and Technology, Vol. 2, No. 1, pp. 40–48, 2008.
L. Liu, T. Stimpson et al., “An Investigation of Security Trends in Personal Wireless Networks”, Springer Science + Business Media, pp. 1669–1687, 2014.
Y. Alkady, M. I. Habib, and R. Y. Rizk, “A new security protocol using hybrid cryptography algorithms,” 9th International Computer Engineering Conference (ICENCO), pp. 109–115, Dec. 2013.
M. Thomas and V. Panchami, “An encryption protocol for end-to-end secure transmission of SMS,” 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], Mar. 2015.
Daemen, J and Rijmen, V, “AES Proposal: Rijndael”, Banksys/Katholieke Universiteit Leuven, Belgium, submission, Jun 1998.
N. Manivannan, Dr. P. Neelameham, “Alternative Pair-wise Key Exchange Protocols (IEEE 802.11i) in Wireless LANs,” Proceedings of International Conference on Wireless and Mobile Communications, pp. 52–58, 2006.
Aidil Izani Jafri, Yean Li Ho, “ANonce encryption in 802.11i 4-way handshake protocol,” Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, pp. 475–480, 2009.
A. Boudguiga and M. Laurent, “Authentication in wireless mesh networks,” in Security for Multihop Wireless Networks. Informa UK, pp. 419–446, 2014.
J. Liu, X. Ye, J. Zhang, and J. Li, “Security verification of 802.11i 4-Way handshake protocol,” IEEE International Conference on Communications, 2008.
Z. Yang, A. C. Champion, B. Gu, X. Bai, and D. Xuan, “Link-layer protection in 802.11i WLANS with dummy authentication,” Proceedings of the 2nd ACM Conference on Wireless Network Security, pp. 131–138, Mar. 2009.
A. Alabdulatif, Xiaoqi, and L. Nolle, “Analysing and attacking the 4-way handshake of IEEE 802.11i standard,” in proc. 8th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 382–387, Dec. 2013.
J. H. Abawajy, S. Mukherjea, S. M. Thampi, and A. Ruiz-Martínez, Eds., Security in computing and communications in Communications in Computer and Information Science. Springer International Publishing, 2015.
L. Ge, L. Wang, L. Xu, and S. Yang, “Password recovery for WPA/WPA2-PSK based on parallel random search with GPU,” in Wireless Communications, Networking and Applications. Springer Science + Business Media, pp. 1149–1159, 2015.
Q.-A. Zeng, Ed., Wireless communications, networking and applications in Lecture Notes in Electrical Engineering. Springer India, 2016.
S. Kansal and M. Mittal, “Performance evaluation of various symmetric encryption algorithms,” 2014 International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 105–109, Dec. 2013.
H. Altunbasak and H. Owen, “Alternative pair-wise key exchange protocols for robust security networks (IEEE 802.11i) in wireless LANs,” Proceedings IEEE Southeast Con, pp. 77–83, March 2004.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, A., Paul, P. (2019). A Secure Three-Way Handshake Authentication Process in IEEE 802.11i. In: Nath, V., Mandal, J. (eds) Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017). Lecture Notes in Electrical Engineering, vol 476. Springer, Singapore. https://doi.org/10.1007/978-981-10-8234-4_58
Download citation
DOI: https://doi.org/10.1007/978-981-10-8234-4_58
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8233-7
Online ISBN: 978-981-10-8234-4
eBook Packages: EngineeringEngineering (R0)