Research Article

KDC Authentication for Secured Communication using Four-Way Handshake Protocol

by  Iyswarya R., Muthunagai S.U., Poorani S., Anitha R.
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Issue 30
Published: Apr 2021
Authors: Iyswarya R., Muthunagai S.U., Poorani S., Anitha R.
10.5120/ijca2021921229
PDF

Iyswarya R., Muthunagai S.U., Poorani S., Anitha R. . KDC Authentication for Secured Communication using Four-Way Handshake Protocol. International Journal of Computer Applications. 174, 30 (Apr 2021), 8-12. DOI=10.5120/ijca2021921229

                        @article{ 10.5120/ijca2021921229,
                        author  = { Iyswarya R.,Muthunagai S.U.,Poorani S.,Anitha R. },
                        title   = { KDC Authentication for Secured Communication using Four-Way Handshake Protocol },
                        journal = { International Journal of Computer Applications },
                        year    = { 2021 },
                        volume  = { 174 },
                        number  = { 30 },
                        pages   = { 8-12 },
                        doi     = { 10.5120/ijca2021921229 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2021
                        %A Iyswarya R.
                        %A Muthunagai S.U.
                        %A Poorani S.
                        %A Anitha R.
                        %T KDC Authentication for Secured Communication using Four-Way Handshake Protocol%T 
                        %J International Journal of Computer Applications
                        %V 174
                        %N 30
                        %P 8-12
                        %R 10.5120/ijca2021921229
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

All the Wi-Fi connected devices are currently secured by WPA2 protocol but in recent studies it proves that the major vulnerability which exploits the man-in-the-middle attack it also referred as KRACK (Key Re-installation AttaCK). In this research, the improvisation of the current scheme of 4-way handshake in the WPA2 (Wi-Fi Protected Access-2) is discussed and has an advantage of already-in-use key exchanged in the handshake. The Key Distribution center (KDC) protocol improvises the WPA2 by randomly generating a session key per communication along with 4-way handshake key exchange in the protocol. Session key is used as a Pre- shared key for the derivation of further components in the key exchange. Thus, the confidentiality in the proposed protocol is maintained in secured manner.

References
  • Agarwal M, Biswas S,and Nandi S, Apr. (2015).'Advanced stealth man-in-the-middle attack in WPA2 encrypted Wi-Fi networks,'IEEE Commun. Lett., Vol. 19, No. 4, pp. 581-584
  • Bai Qinghai, Zhang Wenbo, Jiang Peng , LU Xu ,(2012) , 'Research on Design Principles of Elliptic Curve Public Key Cryptography and Its Implementation' IEEE Explore ,pp 3-5.
  • Ghanem M.C and Ratnayake D.N , (2016),'Enhancing WPA2- PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re- authentication protocol' in Proc. International Conference. Cyber Situational Awareness, Data Analyst Assessment (CyberSA), London, U.K.,pp. 1-7.
  • Ghilen, M. Azizi, and Bouallegue R, (2015), 'Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard' in Proc. IEEE/ACS International Conference Computer System Application. (AICCSA), Marrakech, Morocco, pp. 1-7.
  • Jae Won Noh , Jeehyeong Kim And Sung Yun Cho, (2018) ' Secure Authentication and Four-Way Handshake Scheme for protected Individual Communication in Public Wi- Fi Networks' in IEEE Explore.
  • Liu Y, Wang Y, and Chang G , (2017), 'Efficient privacy- preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm,' IEEE Trans. Intell. Transp. System , Vol. 18, No. 10, pp. 2740-2749.
  • Mitchell J.C and C. He, (2005), 'Security analysis and improvements for IEEE 802.11i' ,in Proc. Network Distributed System Security Symptoms (NDSS), San Diego, CA, USA, pp. 90-110.
  • Noh J, Kim J , Kwon G, and Cho S , (2016) , 'Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography,' in Proc. IEEE International Conference Consum. Electronic-Asia (ICCE), Seoul, South Korea, pp.1-4.
  • Subhas Barman,Samiran Chattopadhyay,Debasis Samanta,(2015) 'An Approach to Cryptographic Key Distribution Through Fingerprint Based Key Distribution Centre' IEEE.pp3-4.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Key Distribution Center(KDC) KRACK(Key Re-installation AttaCK Message Integrity Check (MIC)

Powered by PhDFocusTM