Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 476))

  • 1304 Accesses

Abstract

The significance of wireless devices has been growing day by day. Performance and security are an essential issue, leading to more trustworthy and effective communications. IEEE 802.11i is the most updated security protocol for wireless LAN. Authentication and Key management is a major portion of a secure wireless communication. An IEEE 802.11i usage the IEEE 802.1X standard for authentication; and for key management and distribution, Four-way handshake protocol is used. Research has presented that there are various security concerns associated with the authentic IEEE 802.11i authentication protocol. The most severe of these security concerns is the key recapture attack, during which attackers are able to recover the secret key and use it to get access to a targeted network. In order to alleviate this severe security susceptibility, the aim of this paper is to investigate those vulnerabilities and enhance the IEEE 802.11i standard by presenting a substitute enhanced three-way handshake authentication protocol which can efficiently forestall the key recapture attack. In addition, this technique reduces the memory overheads and computation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. W. Liu, H. Duan, P. Ren, and J. Wu, “Weakness analysis and attack test for WLAN,” International Conference on Green Circuits and Systems (ICGCS), pp. 387–391, June 2010.

    Google Scholar 

  2. Changhua He, John C. Mitchell, “Analysis of the 802.11i 4-way handshake,” Proceedings of the 3rd ACM workshop on Wireless security, pp. 43–50, 2004.

    Google Scholar 

  3. Xinghua Li, Jianfeng Ma, Shen Yulong, An efficient WLAN initial access authentication protocol, Global Communications Conference (GLOBECOM), pp. 1035–1040, 2012.

    Google Scholar 

  4. Xinghua Li, Fenye Bao, Shuxin Li, Jianfeng Ma, “FLAP: An Efficient WLAN Initial Access Authentication Protocol,” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, Issue 2, pp. 488–497, 2013.

    Google Scholar 

  5. Jafri, A. Izani, and Y. Li, “ANonce encryption in 802.11i 4-way handshake protocol,” 7th International Conference on Advances in Mobile Computing and Multimedia, pp. 475–480, Dec. 2009.

    Google Scholar 

  6. Ahmed, Idris and Anne James, “ESKIMO 2-Way Handshake,” 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 437–441, Aug. 2013.

    Google Scholar 

  7. J. Liu, X. Ye, J. Zhang, and J. Li, “Security verification of 802.11i 4-Way handshake protocol,” 2008 IEEE International Conference on Communications, pp. 1642–1647, May 2008.

    Google Scholar 

  8. J. Liu, X. Ye, J. Zhang, J. Li, “Security Verification of 802.11i 4-Way Handshake Protocol,” IEEE International Conference on Communications, pp. 1642–1647, 2008.

    Google Scholar 

  9. Snehasish Parhi, “Attacks Due to Flaw of Protocols Used in Network Access Control (NAC), Their Solutions and Issues: A Survey,” International Journal of Computer Network and Information Security (IJCNIS), Vol. 4, No. 3, pp. 31–46, 2012.

    Google Scholar 

  10. Xiaodong Zha, Maode Ma, “Security improvements of IEEE 802.11i 4-way handshake scheme,” IEEE International Conference on Communication Systems (ICCS), pp. 667–671, 2010.

    Google Scholar 

  11. Xiaodong Zha, Maode Ma, “Security improvements of IEEE 802.11i 4-way handshake scheme,” IEEE International Conference on Communication Systems, pp. 667–671, Nov. 2010.

    Google Scholar 

  12. R. Jani and S. Jani, “Multiple Packet System: A Security Approach for Wireless Networks”, International Journal of Advanced Research in Computer Science, Vol. 4, No. 3, pp. 200–203, 2013.

    Google Scholar 

  13. P. Kumar et al., “Encryption using DES of ANonce in 4-Way Handshake Protocol for Authentication in Wpa2,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 10, pp. 552–557, 2013.

    Google Scholar 

  14. S. H. Eum et al., “A Secure 4‐Way Handshake in 802.11i Using Cookies,” International Journal of Principles and Applications of Information Science and Technology, Vol. 2, No. 1, pp. 40–48, 2008.

    Google Scholar 

  15. L. Liu, T. Stimpson et al., “An Investigation of Security Trends in Personal Wireless Networks”, Springer Science + Business Media, pp. 1669–1687, 2014.

    Google Scholar 

  16. Y. Alkady, M. I. Habib, and R. Y. Rizk, “A new security protocol using hybrid cryptography algorithms,” 9th International Computer Engineering Conference (ICENCO), pp. 109–115, Dec. 2013.

    Google Scholar 

  17. M. Thomas and V. Panchami, “An encryption protocol for end-to-end secure transmission of SMS,” 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], Mar. 2015.

    Google Scholar 

  18. Daemen, J and Rijmen, V, “AES Proposal: Rijndael”, Banksys/Katholieke Universiteit Leuven, Belgium, submission, Jun 1998.

    Google Scholar 

  19. N. Manivannan, Dr. P. Neelameham, “Alternative Pair-wise Key Exchange Protocols (IEEE 802.11i) in Wireless LANs,” Proceedings of International Conference on Wireless and Mobile Communications, pp. 52–58, 2006.

    Google Scholar 

  20. Aidil Izani Jafri, Yean Li Ho, “ANonce encryption in 802.11i 4-way handshake protocol,” Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, pp. 475–480, 2009.

    Google Scholar 

  21. A. Boudguiga and M. Laurent, “Authentication in wireless mesh networks,” in Security for Multihop Wireless Networks. Informa UK, pp. 419–446, 2014.

    Google Scholar 

  22. J. Liu, X. Ye, J. Zhang, and J. Li, “Security verification of 802.11i 4-Way handshake protocol,” IEEE International Conference on Communications, 2008.

    Google Scholar 

  23. Z. Yang, A. C. Champion, B. Gu, X. Bai, and D. Xuan, “Link-layer protection in 802.11i WLANS with dummy authentication,” Proceedings of the 2nd ACM Conference on Wireless Network Security, pp. 131–138, Mar. 2009.

    Google Scholar 

  24. A. Alabdulatif, Xiaoqi, and L. Nolle, “Analysing and attacking the 4-way handshake of IEEE 802.11i standard,” in proc. 8th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 382–387, Dec. 2013.

    Google Scholar 

  25. J. H. Abawajy, S. Mukherjea, S. M. Thampi, and A. Ruiz-Martínez, Eds., Security in computing and communications in Communications in Computer and Information Science. Springer International Publishing, 2015.

    Google Scholar 

  26. L. Ge, L. Wang, L. Xu, and S. Yang, “Password recovery for WPA/WPA2-PSK based on parallel random search with GPU,” in Wireless Communications, Networking and Applications. Springer Science + Business Media, pp. 1149–1159, 2015.

    Google Scholar 

  27. Q.-A. Zeng, Ed., Wireless communications, networking and applications in Lecture Notes in Electrical Engineering. Springer India, 2016.

    Google Scholar 

  28. S. Kansal and M. Mittal, “Performance evaluation of various symmetric encryption algorithms,” 2014 International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 105–109, Dec. 2013.

    Google Scholar 

  29. H. Altunbasak and H. Owen, “Alternative pair-wise key exchange protocols for robust security networks (IEEE 802.11i) in wireless LANs,” Proceedings IEEE Southeast Con, pp. 77–83, March 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anil Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, A., Paul, P. (2019). A Secure Three-Way Handshake Authentication Process in IEEE 802.11i. In: Nath, V., Mandal, J. (eds) Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017). Lecture Notes in Electrical Engineering, vol 476. Springer, Singapore. https://doi.org/10.1007/978-981-10-8234-4_58

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8234-4_58

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8233-7

  • Online ISBN: 978-981-10-8234-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics