Secure key exchange scheme for WPA/WPA2-PSK using public key Cryptography
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Noh, Jaewon | - |
dc.contributor.author | Kim, Jeehyeong | - |
dc.contributor.author | Kwon, Giwon | - |
dc.contributor.author | Cho, Sunghyun | - |
dc.date.accessioned | 2021-06-22T15:22:00Z | - |
dc.date.available | 2021-06-22T15:22:00Z | - |
dc.date.created | 2021-01-22 | - |
dc.date.issued | 2017-10 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/11558 | - |
dc.description.abstract | This paper proposes authentication and key exchange scheme to communicate between users securely in small scale Wi-Fi networks. Depend on the Wi-Fi options, there can be various vulnerabilities in the network. Especially, most of small scale Wi-Fi networks have used the options which can cause several vulnerabilities. These Wi-Fi networks use passphrase for access authentication. However, these passphrases are known by the small network owner. In such circumstances, the network cannot assure security between users in the same network. In the existing Wi-Fi network, attackers in the same network can acquire pairwise keys by eavesdropping messages. Thus, this paper proposes the secure key exchange scheme to apply a public key cryptography. Using public key system, a station and an access point exchange a secondary key which user selects. This key is used for pairwise key generation. Through the proposed scheme, the network can protect users from several attacks in the same Wi-Fi network. © 2016 IEEE. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Secure key exchange scheme for WPA/WPA2-PSK using public key Cryptography | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Cho, Sunghyun | - |
dc.identifier.doi | 10.1109/ICCE-Asia.2016.7804782 | - |
dc.identifier.scopusid | 2-s2.0-85011115128 | - |
dc.identifier.bibliographicCitation | 2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016, pp.1 - 4 | - |
dc.relation.isPartOf | 2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016 | - |
dc.citation.title | 2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 4 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordPlus | Cryptography | - |
dc.subject.keywordPlus | Phase shift keying | - |
dc.subject.keywordPlus | Public key cryptography | - |
dc.subject.keywordPlus | Wi-Fi | - |
dc.subject.keywordPlus | Wireless local area networks (WLAN) | - |
dc.subject.keywordPlus | Access authentications | - |
dc.subject.keywordPlus | Authentication and key exchange | - |
dc.subject.keywordPlus | Key exchange | - |
dc.subject.keywordPlus | Public key systems | - |
dc.subject.keywordPlus | Public keys | - |
dc.subject.keywordPlus | Secure key exchanges | - |
dc.subject.keywordPlus | Security | - |
dc.subject.keywordPlus | WPA2 | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Key exchange | - |
dc.subject.keywordAuthor | PSK | - |
dc.subject.keywordAuthor | Public key | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Wi-Fi | - |
dc.subject.keywordAuthor | WPA | - |
dc.subject.keywordAuthor | WPA2 | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/7804782 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.