Abstract
This paper presents a brief description of the wireless networks, their advantages over wired networks and security issues requiring immediate attention. It is then followed by 802.11 architecture and various services offered by it and then the motivation for conducting the research. Thereafter, a problem statement outlining the inherent flaws in the present IEEE 802.11i standard is presented. Hence, a method is proposed to overcome the denial of service using the handshaking approach. Finally, the results are discussed and concluded.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lashkari AH, Towhidi F, Hosseini RS (2009) In: The international conference on future computer and communication wired equivalent privacy (WEP), ICFCC 2009, pp 492–495
Lashkari AH, Mansoori M, Danesh AS (2009) Wired equivalent privacy (WEP) versus Wi-fi protected access. In: The ICCDA Singapore conference
NIST Special Publication 800-97 (2007) Establishing wireless robust security networks: a guide to IEEE 802.11i
Shiyang D (2010) Compare of new security strategy with several others in WLAN. In: The 2nd international conference on computer engineering and technology (ICCET)
He C, Mitchell JC (2004) Analysis of the 802.11i 4-way handshake. In: Proceedings of the 3rd ACM workshop on wireless security, Philadelphia, PA, USA, pp 43–50
Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA 2). http://cs.gmu.edu/~yhwang1/INFS612/Sample_Projects/Fall_06_GPN_6_Final_Report.pdf
Rango FD, Lentini DC, Marano S (2006) Static and dynamic 4-way handshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802.11i. EURASIP J Wirel Commun Netw 2006:1–19
He C, Mitchell JC (2004) Analysis of the 802.111 4-way handshake. In: Proceedings of the ACM workshop on wireless security (WiSe ’04), Philadelphia, PA, USA, Oct 2004, pp 43–50
Faria DB, Cheriton DR (2002) DoS and authentication in wireless public access networks. In: Proceedings of the ACM workshop on wireless security (WiSe ’02), Atlanta, GA, USA, Sept 2002, pp 47–56
Edney J, Arbaugh WA (2003) Real 802.11 security: WiFi-protected access and 802.11i. Addison Wesley, New York, NY, USA (2003)
Xing X, Shakshuki E, Benoit D, Sheltami T (2008) Security analysis and authentication improvement for IEEE 802.11i specification. In: The IEEE global telecommunications conference, GLOBECOM 2008
Han S-J, Oh H-S, Park J (1996) The improved data encryption standard (DES) algorithm. In: Spread spectrum techniques and applications proceedings
Hassan HR, Challal Y (2005) Enhanced WEP: an efficient solution to WEP threats. In: The second IFIP international conference on wireless and optical communications networks, pp 594–599
Lashkari AH, Danesh MMS, Samadi B (2009) A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: The 2nd IEEE international conference on computer science and information technology, pp 48–52
Chen J-C, Jiang M-C, Liu Y-W (2005) Wireless LAN security and IEEE 802.11i. Wirel Commun. 12. IEEE
Eum S-H, Cho S-J, Choi H-K, Choo H (2008) A robust session key distribution in 802.11i. In: The international conference on computational sciences and its applications ICCSA 2008
Ali KM, Owens TJ (2010) Access mechanisms in Wi-Fi networks state of art, flaws and proposed solutions. In: The IEEE 17th international conference on telecommunications (ICT)
Odhiambo ON, Biermann E, Noel G (2009) An integrated security model for WLAN. In: The AFRICON 2009, pp 1–6
Zhao S, Shoniregun CA, Imafidon C (2008) Addressing the vulnerability of the 4-way handshake of 802.11i. In: The third international conference on digital information management, ICDIM 2008, pp 351–356
Myneni S, Huang D (2010) IEEE 802.11 wireless LAN control frame protection. In: The 7th IEEE consumer communications and networking conference (CCNC)
Khan MA, Hasan A (2008) Pseudo random number based authentication to counter denial of service attacks on 802.11. In: The 5th IFIP international conference on wireless and optical communications networks, WOCN ‘08, pp 1–5
Yao Y, Chong J, Xingwei W (2010) Enhancing RC4 algorithm for WLAN WEP protocol. In: The control and decision conference (CCDC), pp 3623–3627
Chen J-C, Wang Y-P (2005) Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience. IEEE Commun Mag 43:supl.26–supl.32
Gast M (2005) 802.11 wireless networks: the definitive guide. O’Reilly Publication
Liu T, Liu K, Cheng Y, Cai LX (2019) Security analysis of camera file transfer over Wi-Fi. In: ICC 2019-2019 IEEE international conference on communications (ICC). IEEE, pp 1–6
Sarjana FW, Arif TY, Adriman R, Munadi R (2019) Simple prevention of advanced stealth man-in-the-middle attack in WPA2 Wi-Fi networks. In: 2019 international conference on electrical engineering and computer science (ICECOS). IEEE, pp 349–353
Nandi S (2019) Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity. In: 15th international conference on distributed computing and internet technology, ICDCIT 2019, Bhubaneswar, India, 10–13 Jan 2019, vol 11319, p 422. Springer
Singh GM, Kohli MS, Diwakar M (2013) A review of image enhancement techniques in image processing. Int J Technol Innov Res (IJTIR) 5
Diwakar M, Singh P (2020) CT image denoising using multivariate model and its method noise thresholding in non-subsampled shearlet domain. Biomed Signal Process Control 57:101754
Diwakar M, Kumar M (2015) CT image denoising based on complex wavelet transform using local adaptive thresholding and bilateral filtering. In: Proceedings of the third international symposium on women in computing and informatics, pp 297–302
Sharma P, Lal N, Diwakar M (2013) Text security using 2d cellular automata rules. In: Proceedings of the conference on advances in communication and control systems-2013. Atlantis Press, pp 363–368
Kumar P, Sehgal V, Chauhan DS, Diwakar M (2011) Clouds: concept to optimize the quality of service (QOS) for clusters. In: 2011 world congress on information and communication technologies. IEEE, pp 816–821
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Diwakar, M., Singh, P., Kumar, P., Tiwari, K., Bhushan, S., Kaushik, M. (2022). Secure Authentication in WLAN Using Modified Four-Way Handshake Protocol. In: Tomar, A., Malik, H., Kumar, P., Iqbal, A. (eds) Machine Learning, Advances in Computing, Renewable Energy and Communication. Lecture Notes in Electrical Engineering, vol 768. Springer, Singapore. https://doi.org/10.1007/978-981-16-2354-7_56
Download citation
DOI: https://doi.org/10.1007/978-981-16-2354-7_56
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-2353-0
Online ISBN: 978-981-16-2354-7
eBook Packages: EnergyEnergy (R0)