Analysis of Wireless Network Security Based on 4-Way Handshake Protocol

Article Preview

Abstract:

With the growing popularity of network, more and more people use embedded portable devices to carry out e-commerce by wireless network. However, the security of wireless network is increasingly grim. According to the WPA/WPA2, this paper focuses on authentication issues between access point AP and wireless client STA in the wireless network security, and presents an improved protocol to resolve these problems. The improved one based on 4-way handshake protocol can resist dictionary attack, DOS attack and phishing attack. In the End, the paper analyzes the protocol.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1006-1007)

Pages:

924-929

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jian Shen, Yang Xu, Yi Zhou. Wireless LAN Security Enhancement through Trusted Computing Technology[C]. The 2011 Asia-Pacific Youth Conference of Youth Communication and Technology, 2011: 110-114.

Google Scholar

[2] Yanqiong Zhu, Hui Xu. Overview of wireless LAN authentication mechanism[J]. Computer Engineering And Design, 2012, 33(1): 96-100.

Google Scholar

[3] Yonglei Liu, Zhigang Jin. Research on Attack to WEP Protocol. Computer Engineering, 2010, 36(22): 153-154.

Google Scholar

[4] Chunxiao Wang, Peng Zhang. Study on Wireless LAN Security Specification of WPA. Communications Technology, 2010, 43(9): 145-146.

Google Scholar

[5] Quanfu Sun, Shanbai Dalabaev, Qinghua Li. Analysis on WPA/WPA2 Protocol Security [J]. Information Security and Communications Privacy, 2013, (4): 81-83.

Google Scholar

[6] Shen Bai, Yijun Wang, Zhi Xue. Research on Security of WPA/WPA2 Protocol. Information Security And Communications Privacy, 2012(1) : 106-108.

Google Scholar

[7] Feng Liang, Xingrong Shi, Fuping Qu. Security Analysis and Repairs of IEEE802. 11i 4-way Handshake. Computer Engineering, 2007, 33(3): 149-150, 179.

Google Scholar

[8] Xiaojun Wang, Jiande Liu. Analysis and Improvement Against the Attack on 4-way Handshaking Protocol of 802. 11i. Computer Engineering, 2007, 33(3):169-171.

Google Scholar

[9] Yichen Wu. Security Analysis and Improvement of WPA/WPA2-PSK. Computer And Modernization, 2013, 14(1): 153-157.

Google Scholar

[10] Jie Chen, Yupu Hu, Yueyu Zhang. Impossible differential cryptanalysis of advanced encryption standard [J]. Sicence in China(Series: F Information Sciences), 2007, 50(3): 342-350.

DOI: 10.1007/s11432-007-0035-4

Google Scholar