Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The connection establishment and client handover mechanism for Wi-Fi Protected Access (WPA/WPA2) Pre-Shared Key (PSK) networks described by the IEEE 802.11 standard are vulnerable to various attacks. The existing security protocols WPA/WPA2 use symmetric key cryptography to provide confidentiality and data authenticity. An attacker listening to the channel can eavesdrop on the four-way key handshaking and can also derive the encryption key. The well-known attacks are key recovery, man-in-middle, Hole 196, and de-authentication attack. Another key problem with the PSK mode is that all stations use the same key for authentication. In this paper, we propose an alternative to the existing mechanism for authentication and re-authentication during connection establishment and client handover, respectively that use Elliptic Curve Cryptography, a public key encryption technique. Our proposed mechanism uses a lesser number of frames during (re)-authentication and is immune to the existing vulnerabilities of WPA2 PSK.

Cite

CITATION STYLE

APA

Singh, P. K., Vij, P., Vyas, A., Nandi, S. K., & Nandi, S. (2019). Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11319 LNCS, pp. 422–439). Springer Verlag. https://doi.org/10.1007/978-3-030-05366-6_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free