63 Hits in 2.7 sec

Practical verification of WPA-TKIP vulnerabilities

Mathy Vanhoef, Frank Piessens
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
We describe three attacks on the Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP).  ...  We also report on implementation vulnerabilities discovered in some wireless devices. Finally we demonstrate that our attacks can be executed in realistic environments.  ...  EXPERIMENTS In this section we begin by investigating whether TKIP is still supported in practice.  ... 
doi:10.1145/2484313.2484368 dblp:conf/ccs/VanhoefP13 fatcat:gxn7sf7nzfe4lcqtih5mz4ohmm

Basic security measures for IEEE 802.11 wireless networks

Oscar P. Sarmiento, Fabio G. Guerrero, David Rey Argote
2008 Ingeniería e Investigación  
Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used  ...  by TKIP and AES, respectively).  ...  Temporal key integrity protocol (TKIP) WPA encryption and integrity verification (Wi-Fi protected access) is based on the temporary key integrity protocol (TKIP) defined in clause 8.3.2 of the original  ... 
doaj:811d47b8431d4e0ca784145d72c747f9 fatcat:rbjj7c4fvjcebmt5tcibrfbbpq

Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing

Mathy Vanhoef, Domien Schepers, Frank Piessens
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
Our findings include fingerprinting mechanisms, DoS attacks, and downgrade attacks where an adversary can force usage of the insecure WPA-TKIP cipher.  ...  We use model-based testing techniques to detect logical vulnerabilities in implementations of the Wi-Fi handshake.  ...  In [28] the authors test implementations of WPA-TKIP for various logical vulnerabilities, but do not test the Wi-Fi handshake.  ... 
doi:10.1145/3052973.3053008 dblp:conf/ccs/VanhoefSP17 fatcat:3lqnnlrjcnbg5dxv5sibo25fla

Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review [article]

Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues
2022 arXiv   pre-print
Since its inception in 2014, attackers have been targeting WPA Wi-Fi networks to perform different attacks, such as cipher downgrades, denial of service, key reinstallation Man-in-the-Middle (MitM) attacks  ...  We examine practical issues that hamper the total adoption of protection mechanisms, i.e., Security security patches and Protected Management Frames (PMF), and review available defense mechanisms in FragAttacks  ...  We would also thank Mathy Vanhoef for his help by answering some of our queries and providing source codes related to MC-MitM attacks.  ... 
arXiv:2203.00579v1 fatcat:zvgulgm4lvcf3h6ya7i7sakpfu

Evaluation of Enhanced Security Solutions in 802.11-Based Networks [article]

Ifeyinwa Angela Ajah
2014 arXiv   pre-print
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing.  ...  Comprehensive in-depth comparative analysis of each of the security mechanisms is driven by review of related work in WLAN security solutions.  ...  It was argued in [11] that WPA was not really cracked. According to him, the vulnerability seen in WPA was due to a poor deployment of WPA-PSK.  ... 
arXiv:1409.2261v1 fatcat:oxoy63ou7rb5djwgd4sxzcj2wi

Security In Wireless Local Area Network (wlan)

Kareshna Zamani, Mehrnoosh Torabi, Hamidreza Moumeni
2012 Journal of Mathematics and Computer Science  
WEP, WPA and WPAv2 are studied as well as their negative and positive aspects.  ...  In this article, first different security methods of local wireless networks, as subsidiaries of wireless networks, are introduced and then the efficiency of so far introduced security methods such as  ...  According to this information, WPA CRACKER can declare whether this network is vulnerable against this kind of attack or not.  ... 
doi:10.22436/jmcs.05.04.10 fatcat:q7obgrvy7jdwnnz7pkjgbtm4iq

Automated Fake Access Point Attack Detection and Prevention System with IoT Devices

İlhan Fırat KILINÇER, Fatih ERTAM, Abdülkadir ŞENGÜR
2020 Balkan Journal of Electrical and Computer Engineering  
With the development of the Internet of Things (IoT), WiFi networks are widely used in our homes, workplaces, social areas, campus areas.  ...  With the increase of WiFi networks, attacks on these networks are constantly increasing.  ...  access networks such as WiFi has emerged as a practical solution [1] .  ... 
doi:10.17694/bajece.634104 fatcat:3guwubcihzfhnkdtxv34aspfd4

Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties

R. Singh, J. Moreira, T. Chothia, M. Ryan
2020 Zenodo  
We nd that our Tamarin models vulnerable to the KRACK attacks do not violate any of the standard's security properties, indicating that the properties, as speci ed by the standard, are insucient.  ...  We propose an additional security property and show that it is violated by systems vulnerable to KRACK attacks, and that enforcing this property is successful in stopping them.  ...  Clients can either actively send and receive probes, or just observe the broadcast beacons passively to learn the supported cipher suites (e.g., TKIP and/or AES-CCMP), and version of WPA.  ... 
doi:10.5281/zenodo.4066506 fatcat:gzkib3hworg6xjd2lek5qkno6a

A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX

Günther Lackner
2013 International Journal of Network Security  
This article provides a detailed overview, analysis and discussion of state-of-the-art security mechanisms in wireless networks and briefly presents their development and history allowing the reader to  ...  Founded on a series of insecure implementations and design faults, recent standards and amendments show some improvements.  ...  Acknowledgments This study was supported by the National Science Council of Taiwan under grant NSC 95-2416-H-159-003.  ... 
dblp:journals/ijnsec/Lackner13 fatcat:ildslpbn25emjfza6b36uwnmoq

Secure Mobile Computing [chapter]

Dharma P. Agrawal, Hongmei Deng, Rajani Poosarla, Sugata Sanyal
2003 Lecture Notes in Computer Science  
While we are enjoying the various services brought by mobile computing, we have to realize that it comes with a price: security vulnerabilities.  ...  reach of a person.  ...  Acknowledgment This work has been supported by the Ohio Board of Regents, Doctoral Enhancement Funds and the National Science Foundation under Grant No. CCR-0113361.  ... 
doi:10.1007/978-3-540-24604-6_26 fatcat:nusqnfs7kjhc5awshzmlkmk2ni

Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i

Floriano De Rango, Dionigi Cristian Lentini, Salvatore Marano
2006 EURASIP Journal on Wireless Communications and Networking  
, a solution is found and an extension of WPA and IEEE 802.11 is proposed.  ...  Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i  ...  On the contrary TKIP in WPA can be executed mostly by low-power processors that are supported in the overall existing APs and, moreover, TKIP reuses the WEP hardware to offload most of the computational  ... 
doi:10.1155/wcn/2006/47453 fatcat:mpdsk62sijge3jt3d535z5tkr4

Securing a Wireless World

Hao Yang, F. Ricciato, Songwu Lu, Lixia Zhang
2006 Proceedings of the IEEE  
In this paper, we survey the state-of-the-art approaches to providing security for three popular wireless networking paradigms, namely, IEEE 802.11 based WLANs, third-generation cellular networks, and  ...  The details of TKIP and MIC are described below.  ...  In fact, WPA was based on an earlier 802.11i draft, and all its essential features, such as TKIP/ Michael, are retained in 802.11i.  ... 
doi:10.1109/jproc.2005.862321 fatcat:vgfacpwckngavp6df2d4642lei

Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys

Mathy Vanhoef, Frank Piessens
2016 USENIX Security Symposium  
We analyze the generation and management of 802.11 group keys. These keys protect broadcast and multicast Wi-Fi traffic.  ...  First we argue that the 802.11 random number generator is flawed by design, and provides an insufficient amount of entropy.  ...  D. fellowship of the Research Foundation -Flanders (FWO).  ... 
dblp:conf/uss/VanhoefP16 fatcat:upa2zwpb4rdm5dnoa5doeoku5i

Automated Man-in-the-Middle Attack Against Wi‑Fi Networks

Martin Vondráček, Jan Pluskal, Ondřej Ryšavý
2018 Journal of Digital Forensics, Security and Law  
In this paper, we present a practical tool that can automate the attack on wireless security.  ...  The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS.  ...  ACKNOWLEDGEMENTS This work was supported by Ministry of Interior of the Czech Republic project "Integrated platform for analysis of digital data c 2018 ADFSL  ... 
doi:10.15394/jdfsl.2018.1495 fatcat:5enzs4p33ngc7hwwz2rrxb7cpa

Security in Wireless Local Area Networks (WLANs) [chapter]

Rajeev Singh, Teek Parval Sharma
2019 Computer and Network Security [Working Title]  
., WEP (Wired Equivalent Privacy), TKIP (Temporal Key Integrity Protocol) and AES-CCMP (Advanced Encryption Standard-Counter mode with CBC-MAC protocol) are used.  ...  Out of these, AES-CCMP protocol is secure enough and mostly used in enterprises.  ...  Through practical measurements it is shown that FLAP can improve the efficiency of EAP-TLS by 94.7 percent.  ... 
doi:10.5772/intechopen.89857 fatcat:5fhzmhjutzfedbc6nzc3w7rvny
« Previous Showing results 1 — 15 out of 63 results