Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Efficient, DoS-resistant, secure key exchange for internet protocols
Proceedings of the 9th ACM conference on Computer and communications security
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
The Murphi Verification System
CAV '96 Proceedings of the 8th International Conference on Computer Aided Verification
Analysis of a Denial of Service Attack on TCP
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Automated analysis of cryptographic protocols using Mur/spl phi/
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Finite-state analysis of SSL 3.0
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Security analysis of network protocols: logical and computational methods
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
Implementation and performance analysis of IEEE 802.11i standard using the IXP425 network processor
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
EURASIP Journal on Wireless Communications and Networking
An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks
Information Networking. Towards Ubiquitous Networking and Services
Link-layer protection in 802.11i WLANS with dummy authentication
Proceedings of the second ACM conference on Wireless network security
Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Two-way Handshake protocol for improved security in IEEE 802.11 wireless LANs
Computer Communications
An efficient pre-authentication scheme for IEEE 802.11-based vehicular networks
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Design of WLAN secure system against weaknesses of the ieee 802.1x
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Analysis of EAP-GPSK authentication protocol
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
4-way handshake solutions to avoid denial of service attack in ultra wideband networks
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
ANonce encryption in 802.11i 4-way handshake protocol
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
How secure is WiFi MAC layer in comparison with IPsec for classified environments?
Proceedings of the 14th Communications and Networking Symposium
The security proof of a 4-way handshake protocol in IEEE 802.11i
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
Hi-index | 0.00 |
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), the authenticator (access point), and the authentication server (e.g., a backend RADIUS server). A 4-Way Handshake must be executed between the supplicant and the authenticator to derive a fresh pairwise key and/or group key for subsequent data transmissions.We analyze the 4-Way Handshake protocol using a finite-state verification tool and find a Denial-of-Service attack. The attack involves forging initial messages from the authenticator to the supplicant to produce inconsistent keys in peers. Three repairs are proposed; based on various considerations, the third one appears to be the best. The resulting improvement to the standard, adopted by the 802.11 TGi in their final deliberation, involves only a minor change in the algorithm used by the supplicant.