Font Size: a A A

Effective Schemes To Prevent Attacks Due To Four Ways Handshake Vulnerabilities In The WIFI

Posted on:2020-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:Tchoutchoua Teyou Cyrille ClovFull Text:PDF
GTID:2428330572961545Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The growing volume of attacks on the internet has increased the demand for more robust systems and sophisticated tools for vulnerability analysis,intrusion detection,forensic investigations,and possible responses.Current hacking tools and technologies warrant reengineering in order to address cybercrime and homeland security.It is necessary to be aware about flaws of network to secure the information infrastructure.This is done by gathering network topology,intelligence,internal/external vulnerability analysis,and penetration testing.The primary objective is to minimize damages and prevent the attackers from exploiting weaknesses and vulnerabilities in a 4-way handshake(WIFI),The problem is that all stations in the same network have the same pre-shared key after the association.The attackers can derive an encryption key by eavesdropping on the four-way handshake procedure.We apply an elliptic curve public key cryptography concept to the proposed scheme to keep the key safe.This thesis deals with explaining and providing alternative approaches to avoid the several types of attack,such as Key Recovery Attack(KRACK),Man in the Middle,De-Authentication Attack Downgrade and DoS Attacks.These attacks exploit vulnerabilities during the authentication stage of a 4-way handshake process that is used in establishing connection over IEEE802.11i Some amendments were made in 4-way handshake process to reduce these types of attacks.An enhanced 4-way Handshake Process over IEEE802.11i Implementation is proposed and discussed in further details.In the proposed scheme,only an access point(AP)has its public key and private key pair.This scheme addresses the problem by exchanging a secondary key that every station determines or generates during the authentication procedure.In our scheme,the secondary key is encrypted by a station before it is transmitted to the AP.The AP can only decrypt the encrypted authentication message using its private key.Every user can generate a unique pre-shared key by using the secondary key and other following keys,which are derived from the four-way handshake procedure additionally the exchange of the secondary key can defend against attacks from the malicious activities in the same network.The safety of the proposed scheme is analyzed by several attack scenarios defined in chapter 3 namely Key Recovery Attack(KRACK),Man in the Middle,De-Authentication Attack and others.Accordingly,our scheme provides more security level,192 bits or 256 bits,compared with the conventional WPA2-PSK-based public Wi-Fi networks.Our work focused on wireless local area networks(WLANs),to be precise,the four-way handshake vulnerabilities and solutions.It examined how to fix the flaws in recently discovered vulnerabilities in the IEEE 802.11 security protocols of WLANs;in WPA/WPA2 on four ways handshake stage.We examine the worst case where attacker is inside the Network.Examples were provided and outlined where it was possible to produce attacks.A solution and an extension of WPA and WPA2 were proposed to prevent such attacks without improve the perplexity of Wi-Fi Client device unduly and wanting not to change some farther control fields of the frame structure of WIFI.Reinforcements to the current protocols were attained by means of some simple changes on both side:station and AP and they were too strong versus the Downgrade,De-authentication,KRACK attacks and more.A laboratory consisting of two laptops with wireless cards,a wireless access point FORTIAP,and an authentication server were set up to probe into the security protocols.Kali Linux was installed on one of the laptops.The software air crack,FLUXION were used to launch various attacks to test vulnerabilities and to retrieve the secret keys of WPA and WPA-2.
Keywords/Search Tags:WPA2-PSK WPA3, Wi-Fi, attack flow, security analysis, elliptic curve cryptography Cipher 4 RC4, RSNE, TKIP, WPA, IEE802.11i, Authentication, four-way handshake
PDF Full Text Request
Related items