Skip to main content

Secure Authentication in WLAN Using Modified Four-Way Handshake Protocol

  • Conference paper
  • First Online:
Machine Learning, Advances in Computing, Renewable Energy and Communication

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 768))

Abstract

This paper presents a brief description of the wireless networks, their advantages over wired networks and security issues requiring immediate attention. It is then followed by 802.11 architecture and various services offered by it and then the motivation for conducting the research. Thereafter, a problem statement outlining the inherent flaws in the present IEEE 802.11i standard is presented. Hence, a method is proposed to overcome the denial of service using the handshaking approach. Finally, the results are discussed and concluded.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lashkari AH, Towhidi F, Hosseini RS (2009) In: The international conference on future computer and communication wired equivalent privacy (WEP), ICFCC 2009, pp 492–495

    Google Scholar 

  2. Lashkari AH, Mansoori M, Danesh AS (2009) Wired equivalent privacy (WEP) versus Wi-fi protected access. In: The ICCDA Singapore conference

    Google Scholar 

  3. NIST Special Publication 800-97 (2007) Establishing wireless robust security networks: a guide to IEEE 802.11i

    Google Scholar 

  4. Shiyang D (2010) Compare of new security strategy with several others in WLAN. In: The 2nd international conference on computer engineering and technology (ICCET)

    Google Scholar 

  5. He C, Mitchell JC (2004) Analysis of the 802.11i 4-way handshake. In: Proceedings of the 3rd ACM workshop on wireless security, Philadelphia, PA, USA, pp 43–50

    Google Scholar 

  6. Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA 2). http://cs.gmu.edu/~yhwang1/INFS612/Sample_Projects/Fall_06_GPN_6_Final_Report.pdf

  7. Rango FD, Lentini DC, Marano S (2006) Static and dynamic 4-way handshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802.11i. EURASIP J Wirel Commun Netw 2006:1–19

    Google Scholar 

  8. He C, Mitchell JC (2004) Analysis of the 802.111 4-way handshake. In: Proceedings of the ACM workshop on wireless security (WiSe ’04), Philadelphia, PA, USA, Oct 2004, pp 43–50

    Google Scholar 

  9. Faria DB, Cheriton DR (2002) DoS and authentication in wireless public access networks. In: Proceedings of the ACM workshop on wireless security (WiSe ’02), Atlanta, GA, USA, Sept 2002, pp 47–56

    Google Scholar 

  10. Edney J, Arbaugh WA (2003) Real 802.11 security: WiFi-protected access and 802.11i. Addison Wesley, New York, NY, USA (2003)

    Google Scholar 

  11. Xing X, Shakshuki E, Benoit D, Sheltami T (2008) Security analysis and authentication improvement for IEEE 802.11i specification. In: The IEEE global telecommunications conference, GLOBECOM 2008

    Google Scholar 

  12. Han S-J, Oh H-S, Park J (1996) The improved data encryption standard (DES) algorithm. In: Spread spectrum techniques and applications proceedings

    Google Scholar 

  13. Hassan HR, Challal Y (2005) Enhanced WEP: an efficient solution to WEP threats. In: The second IFIP international conference on wireless and optical communications networks, pp 594–599

    Google Scholar 

  14. Lashkari AH, Danesh MMS, Samadi B (2009) A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: The 2nd IEEE international conference on computer science and information technology, pp 48–52

    Google Scholar 

  15. Chen J-C, Jiang M-C, Liu Y-W (2005) Wireless LAN security and IEEE 802.11i. Wirel Commun. 12. IEEE

    Google Scholar 

  16. Eum S-H, Cho S-J, Choi H-K, Choo H (2008) A robust session key distribution in 802.11i. In: The international conference on computational sciences and its applications ICCSA 2008

    Google Scholar 

  17. Ali KM, Owens TJ (2010) Access mechanisms in Wi-Fi networks state of art, flaws and proposed solutions. In: The IEEE 17th international conference on telecommunications (ICT)

    Google Scholar 

  18. Odhiambo ON, Biermann E, Noel G (2009) An integrated security model for WLAN. In: The AFRICON 2009, pp 1–6

    Google Scholar 

  19. Zhao S, Shoniregun CA, Imafidon C (2008) Addressing the vulnerability of the 4-way handshake of 802.11i. In: The third international conference on digital information management, ICDIM 2008, pp 351–356

    Google Scholar 

  20. Myneni S, Huang D (2010) IEEE 802.11 wireless LAN control frame protection. In: The 7th IEEE consumer communications and networking conference (CCNC)

    Google Scholar 

  21. Khan MA, Hasan A (2008) Pseudo random number based authentication to counter denial of service attacks on 802.11. In: The 5th IFIP international conference on wireless and optical communications networks, WOCN ‘08, pp 1–5

    Google Scholar 

  22. Yao Y, Chong J, Xingwei W (2010) Enhancing RC4 algorithm for WLAN WEP protocol. In: The control and decision conference (CCDC), pp 3623–3627

    Google Scholar 

  23. Chen J-C, Wang Y-P (2005) Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience. IEEE Commun Mag 43:supl.26–supl.32

    Google Scholar 

  24. Gast M (2005) 802.11 wireless networks: the definitive guide. O’Reilly Publication

    Google Scholar 

  25. Liu T, Liu K, Cheng Y, Cai LX (2019) Security analysis of camera file transfer over Wi-Fi. In: ICC 2019-2019 IEEE international conference on communications (ICC). IEEE, pp 1–6

    Google Scholar 

  26. Sarjana FW, Arif TY, Adriman R, Munadi R (2019) Simple prevention of advanced stealth man-in-the-middle attack in WPA2 Wi-Fi networks. In: 2019 international conference on electrical engineering and computer science (ICECOS). IEEE, pp 349–353

    Google Scholar 

  27. Nandi S (2019) Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity. In: 15th international conference on distributed computing and internet technology, ICDCIT 2019, Bhubaneswar, India, 10–13 Jan 2019, vol 11319, p 422. Springer

    Google Scholar 

  28. Singh GM, Kohli MS, Diwakar M (2013) A review of image enhancement techniques in image processing. Int J Technol Innov Res (IJTIR) 5

    Google Scholar 

  29. Diwakar M, Singh P (2020) CT image denoising using multivariate model and its method noise thresholding in non-subsampled shearlet domain. Biomed Signal Process Control 57:101754

    Article  Google Scholar 

  30. Diwakar M, Kumar M (2015) CT image denoising based on complex wavelet transform using local adaptive thresholding and bilateral filtering. In: Proceedings of the third international symposium on women in computing and informatics, pp 297–302

    Google Scholar 

  31. Sharma P, Lal N, Diwakar M (2013) Text security using 2d cellular automata rules. In: Proceedings of the conference on advances in communication and control systems-2013. Atlantis Press, pp 363–368

    Google Scholar 

  32. Kumar P, Sehgal V, Chauhan DS, Diwakar M (2011) Clouds: concept to optimize the quality of service (QOS) for clusters. In: 2011 world congress on information and communication technologies. IEEE, pp 816–821

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Diwakar, M., Singh, P., Kumar, P., Tiwari, K., Bhushan, S., Kaushik, M. (2022). Secure Authentication in WLAN Using Modified Four-Way Handshake Protocol. In: Tomar, A., Malik, H., Kumar, P., Iqbal, A. (eds) Machine Learning, Advances in Computing, Renewable Energy and Communication. Lecture Notes in Electrical Engineering, vol 768. Springer, Singapore. https://doi.org/10.1007/978-981-16-2354-7_56

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-2354-7_56

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-2353-0

  • Online ISBN: 978-981-16-2354-7

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics