Effective Schemes to Prevent Attacks Due to Four Ways Handsh
發(fā)布時(shí)間:2021-02-08 12:37
隨著互聯(lián)網(wǎng)攻擊日漸增多,對更強(qiáng)大系統(tǒng)和復(fù)雜工具的需求也越來越多,這些系統(tǒng)和工具要具備漏洞分析,入侵檢測,深層檢查和預(yù)期響應(yīng)等功能。當(dāng)前的黑客工具和技術(shù)需要通過再造來解決網(wǎng)絡(luò)犯罪和國土安全問題,因此了解網(wǎng)絡(luò)的缺陷以保護(hù)信息基礎(chǔ)設(shè)施就尤為必要。這就需要收集網(wǎng)絡(luò)拓?fù)?智能,內(nèi)部/外部漏洞分析和滲透測試來完成。主要目標(biāo)是將攻擊傷害降至最低并防止攻擊者利用四次握手(WIFI)中的弱點(diǎn)和漏洞。但問題是,同一網(wǎng)絡(luò)中的所有站點(diǎn)在關(guān)聯(lián)后具有相同的預(yù)共享密鑰。攻擊者可以通過竊聽四次握手程序(4路握手程序)來獲得加密密鑰。在上述方案中,我們引入橢圓曲線公鑰加密概念保持密鑰安全。本文旨在解釋并給出一些替代方法來預(yù)防包括密鑰恢復(fù)攻擊(KRACK)、中間人、去認(rèn)證攻擊降級和DoS攻擊在內(nèi)的攻擊。這些攻擊利用了在通過IEEE802.11i建立連接時(shí)使用的4次握手過程的身份驗(yàn)證階段中的漏洞,因此我們在四次握手過程強(qiáng)型四次握手過程,并會(huì)做進(jìn)一步的討論。在所提出的方案中,只有接入點(diǎn)(AP)具有其公鑰和私鑰對,該方案通過交換每個(gè)站在認(rèn)證過程期間確定或生成的二級密鑰來解決攻擊問題。在我們的方案中,輔助密鑰在被發(fā)送到AP之前由...
【文章來源】:杭州電子科技大學(xué)浙江省
【文章頁數(shù)】:76 頁
【學(xué)位級別】:碩士
【文章目錄】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1:Introduction
1.1 History of WLAN and evolution of WIFI security Protocol
1.2 Research Question
1.3 Scope
Chapter 2:Security protocol for WLAN
2.1 IEEE 802.11 Standards for WLAN
2.2 Wired Equivalent Privacy: WEP
2.2.1 Encryption of information
2.2.2 Decryption of Information at Receiving Side
2.3 The 802.1 1istandard
2.4 Wireless Protected Acces:WPA
2.4.1 WPA Architecture
2.5 Wireless Protected AccesⅡ: WPA2
2.5.1 WPA2 architecture
2.6 Wireless Protected Access Version 3
2.7 Chapter Summary
Chapter 3:Vulnerabilities security protocol and survey of recent attacks
3.1 Vulnerabilities of WEP
3.2 Vulnerabilities of WPA
3.3 Vulnerabilities of WPA2
3.4 Survey of Recent Attacks
3.4.1 Block 1 Attacks
3.4.2 Block 2 of Attacks
3.4.3 Block 3 of Attacks
3.4.4 Block 4 of Attacks
3.4.5 Different Outcomes from Attacks
3.5 Chapter summary
Chapter 4:Proposed Scheme implementation and Evaluation
4.1 Related Work
4.2 Proposed Model Implementation
4.2.1 Description of Our Proposed Model
4.2.2 Preliminary Knowledge for Elliptic Curve Cryptographic (ECC)
4.2.3 WI-FI Access Authentication Procedure
4.2.4 Proposed 4-Way Handshake Procedure
4.3 Security Overhead Analysis
4.3.1 Formal Verification of Our Schemes with BAN Logic
4.3.2 Security Enhancement Analysis against Classic Attacks
4.3.3 Overheads Analysis,Evaluations and Comparison
4.4 Comparison approach with recent research
Chapter 5:Conclusion
Acknowledgements
References
Appendix
本文編號:3023931
【文章來源】:杭州電子科技大學(xué)浙江省
【文章頁數(shù)】:76 頁
【學(xué)位級別】:碩士
【文章目錄】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1:Introduction
1.1 History of WLAN and evolution of WIFI security Protocol
1.2 Research Question
1.3 Scope
Chapter 2:Security protocol for WLAN
2.1 IEEE 802.11 Standards for WLAN
2.2 Wired Equivalent Privacy: WEP
2.2.1 Encryption of information
2.2.2 Decryption of Information at Receiving Side
2.3 The 802.1 1istandard
2.4 Wireless Protected Acces:WPA
2.4.1 WPA Architecture
2.5 Wireless Protected AccesⅡ: WPA2
2.5.1 WPA2 architecture
2.6 Wireless Protected Access Version 3
2.7 Chapter Summary
Chapter 3:Vulnerabilities security protocol and survey of recent attacks
3.1 Vulnerabilities of WEP
3.2 Vulnerabilities of WPA
3.3 Vulnerabilities of WPA2
3.4 Survey of Recent Attacks
3.4.1 Block 1 Attacks
3.4.2 Block 2 of Attacks
3.4.3 Block 3 of Attacks
3.4.4 Block 4 of Attacks
3.4.5 Different Outcomes from Attacks
3.5 Chapter summary
Chapter 4:Proposed Scheme implementation and Evaluation
4.1 Related Work
4.2 Proposed Model Implementation
4.2.1 Description of Our Proposed Model
4.2.2 Preliminary Knowledge for Elliptic Curve Cryptographic (ECC)
4.2.3 WI-FI Access Authentication Procedure
4.2.4 Proposed 4-Way Handshake Procedure
4.3 Security Overhead Analysis
4.3.1 Formal Verification of Our Schemes with BAN Logic
4.3.2 Security Enhancement Analysis against Classic Attacks
4.3.3 Overheads Analysis,Evaluations and Comparison
4.4 Comparison approach with recent research
Chapter 5:Conclusion
Acknowledgements
References
Appendix
本文編號:3023931
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/3023931.html
最近更新
教材專著