2013 IEEE Third International Conference on Information Science and Technology (ICIST) 2013
DOI: 10.1109/icist.2013.6747576
|View full text |Cite
|
Sign up to set email alerts
|

Analysing and attacking the 4-way handshake of IEEE 802.11i standard

Abstract: Abstract-The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and the authenticator use the pairwise master key (PMK) to derive a fresh pairwise transient key (PTK). The PMK is not used directly for security while assuming the supplicant and authenticator have the same PMK before running 4-way handshake. In this paper, the 4-way handshake phase has been analysed using Isabelle tool to identify a new Denial-ofService (DoS) attack. The attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Fig. 8 shows the general 802.1x messaging steps (Chen and Wang 2005;Fantacci et al 2007;Gu and Zhang 2010;Zha and Ma 2010;Alabdulatif et al 2013;Hermaduanti and Riadi 2016). When Fig.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Fig. 8 shows the general 802.1x messaging steps (Chen and Wang 2005;Fantacci et al 2007;Gu and Zhang 2010;Zha and Ma 2010;Alabdulatif et al 2013;Hermaduanti and Riadi 2016). When Fig.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Thus, this vulnerability blocks the subsequent handshakes because of inconsistencies in the PTK at the authenticator and the supplicant. Smart attackers can determine the perfect time to send the forged first message by sniffing WLAN traffic, or may simply flood the WLAN with messages, causing a DoS [32,33].…”
Section: Forged First Message In a Four-way Handshakementioning
confidence: 99%
“…For increasing security, the PMK isn't transmitted through the network. PTK is generated using PMK, and GTK is generated using GMK [5]. All unicast traffic between U and AP are encrypted using PTK, and all broadcast traffic between AP and the number of users are encrypted using GTK [3].…”
Section: Introductionmentioning
confidence: 99%