CFP last date
20 May 2024
Reseach Article

KDC Authentication for Secured Communication using Four-Way Handshake Protocol

by Iyswarya R., Muthunagai S.U., Poorani S., Anitha R.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 30
Year of Publication: 2021
Authors: Iyswarya R., Muthunagai S.U., Poorani S., Anitha R.
10.5120/ijca2021921229

Iyswarya R., Muthunagai S.U., Poorani S., Anitha R. . KDC Authentication for Secured Communication using Four-Way Handshake Protocol. International Journal of Computer Applications. 174, 30 ( Apr 2021), 8-12. DOI=10.5120/ijca2021921229

@article{ 10.5120/ijca2021921229,
author = { Iyswarya R., Muthunagai S.U., Poorani S., Anitha R. },
title = { KDC Authentication for Secured Communication using Four-Way Handshake Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2021 },
volume = { 174 },
number = { 30 },
month = { Apr },
year = { 2021 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number30/31868-2021921229/ },
doi = { 10.5120/ijca2021921229 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:23:30.400221+05:30
%A Iyswarya R.
%A Muthunagai S.U.
%A Poorani S.
%A Anitha R.
%T KDC Authentication for Secured Communication using Four-Way Handshake Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 30
%P 8-12
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

All the Wi-Fi connected devices are currently secured by WPA2 protocol but in recent studies it proves that the major vulnerability which exploits the man-in-the-middle attack it also referred as KRACK (Key Re-installation AttaCK). In this research, the improvisation of the current scheme of 4-way handshake in the WPA2 (Wi-Fi Protected Access-2) is discussed and has an advantage of already-in-use key exchanged in the handshake. The Key Distribution center (KDC) protocol improvises the WPA2 by randomly generating a session key per communication along with 4-way handshake key exchange in the protocol. Session key is used as a Pre- shared key for the derivation of further components in the key exchange. Thus, the confidentiality in the proposed protocol is maintained in secured manner.

References
  1. Agarwal M, Biswas S,and Nandi S, Apr. (2015).'Advanced stealth man-in-the-middle attack in WPA2 encrypted Wi-Fi networks,'IEEE Commun. Lett., Vol. 19, No. 4, pp. 581-584
  2. Bai Qinghai, Zhang Wenbo, Jiang Peng , LU Xu ,(2012) , 'Research on Design Principles of Elliptic Curve Public Key Cryptography and Its Implementation' IEEE Explore ,pp 3-5.
  3. Ghanem M.C and Ratnayake D.N , (2016),'Enhancing WPA2- PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re- authentication protocol' in Proc. International Conference. Cyber Situational Awareness, Data Analyst Assessment (CyberSA), London, U.K.,pp. 1-7.
  4. Ghilen, M. Azizi, and Bouallegue R, (2015), 'Integration of a quantum protocol for mutual authentication and secret key distribution within 802.11i standard' in Proc. IEEE/ACS International Conference Computer System Application. (AICCSA), Marrakech, Morocco, pp. 1-7.
  5. Jae Won Noh , Jeehyeong Kim And Sung Yun Cho, (2018) ' Secure Authentication and Four-Way Handshake Scheme for protected Individual Communication in Public Wi- Fi Networks' in IEEE Explore.
  6. Liu Y, Wang Y, and Chang G , (2017), 'Efficient privacy- preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm,' IEEE Trans. Intell. Transp. System , Vol. 18, No. 10, pp. 2740-2749.
  7. Mitchell J.C and C. He, (2005), 'Security analysis and improvements for IEEE 802.11i' ,in Proc. Network Distributed System Security Symptoms (NDSS), San Diego, CA, USA, pp. 90-110.
  8. Noh J, Kim J , Kwon G, and Cho S , (2016) , 'Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography,' in Proc. IEEE International Conference Consum. Electronic-Asia (ICCE), Seoul, South Korea, pp.1-4.
  9. Subhas Barman,Samiran Chattopadhyay,Debasis Samanta,(2015) 'An Approach to Cryptographic Key Distribution Through Fingerprint Based Key Distribution Centre' IEEE.pp3-4.
Index Terms

Computer Science
Information Sciences

Keywords

Key Distribution Center(KDC) KRACK(Key Re-installation AttaCK Message Integrity Check (MIC)