Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015, Journal of Circuits, Systems, and Computers
AI
This thesis presents an FPGA architecture designed to significantly expedite the generation of lookup tables for WPA/WPA2 passphrase recovery. Despite WPA's improvements over WEP, vulnerabilities remain, particularly in WPA personal mode, which allows attackers to capture traffic during the four-way handshake and reverse the passphrase with enough computational resources. The focus is on providing an efficient method for generating and validating lookups against possible pre-shared keys and SSIDs, particularly for less common SSIDs which lack pre-generated tables.
IEEE Systems Journal, 2015
Maintaining a high level of data security with a low impact on system performance is more challenging in wireless multimedia applications. Protocols that are used for wireless local area network (WLAN) security are known to significantly degrade performance. In this paper, we propose an enhanced security system for a WLAN. Our new design aims to decrease the processing delay and increase both the speed and throughput of the system, thereby making it more efficient for multimedia applications. Our design is based on the idea of offloading computationally intensive encryption and authentication services to the end systems' CPUs. The security operations are performed by the hosts' central processor (which is usually a powerful processor) before delivering the data to a wireless card (which usually has a low-performance processor). By adopting this design, we show that both the delay and the jitter are significantly reduced. At the access point, we improve the performance of network processing hardware for real-time cryptographic processing by using a specialized processor implemented with field-programmable gate array technology.
Proceedings of the 7th …, 2008
Wireless networks provide convenient and low cost mechanism for connecting network devices. They are ideal since they do not require physical connections .They therefore help to overcome the port limitations of the physical hardware. Any device that has radio receiver can detect these wireless signals. This is because a wireless router transmits the signals uniformly in all directions. The ease with which connections can be established forms one of the weaknesses of wireless networks. They are therefore exposed to many attacks as these attacks can be launched from a remote location, unlike in wired networks where one needs physical connections to the network of interest. To overcome this challenge, authentication protocols have been developed to deter any illicit access to wireless networks. These protocols include Wired Equivalent Privacy(WEP) and Wi-Fi Protected Access (WPA). Wi-Fi Protected Access version 2 (WPA2) is the later version of WPA. The objective of this research paper was to demonstrate that WPA2 can still be broken, hence compromising on the Confidentiality, Integrity and Availability (CIA) of the data being transmitted in wireless networks. Data Confidentiality, Integrity and availability has been referred to as the CIA triad in this paper. The set up was implemented in Ubuntu 12.04 operating system using Ettercap, File2air, Khexedit , Wireshark and Airodump-ng from Aircrack-ng suite. The results indicated that WPA2 does not actually protect data in transit in wireless networks, and therefore there is need to explore other technologies that can secure wireless networks.
Journal of Physics: Conference Series, 2005
The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the Wired Equivalent Privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the Advanced Encryption Standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A Field Programmable Gate Array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.
2008
Software radios are communication devices with different configurations that enable to operate in different communication networks. Considering the OSI model, the main development of these radios is focused on the lower layers, which are implemented in hardware. Security is a key element for using software radios, because they can enter to different wireless networks and use the air like transmission medium, being vulnerable to possible attacks to the transmission of data. Several security architectures have been standardized for different networks, such as IEEE 802.11i-2004 for WLANs (Wireless Local Area Networks) and IEEE 802.16e-2005 for WMANs (Wireless Metropolitan Area Networks), operating on the MAC (Medium Access Control) sublayer. In this work, hardware implementations of these architectures are evaluated in terms of FPGA implementation costs and performance to be considered in a reconfigurable hardware platform, which supports both security architectures, working on the MAC sublayer. For the design of the reconfigurable platforms, it is required to examine characteristics such as hardware resources, throughput and reconfigurable/ nonreconfigurable modules with focus in the software-radio applications. These implementations of the proposed hardware architectures are based on the AES-CCM algorithm that is one of the most important cryptographic algorithms.
Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services)
2013
Software radios are communication devices with different configurations that enable to operate in different communication networks. Considering the OSI model, the main development of these radios is focused on the lower layers, which are implemented in hardware. Security is a key element for using software radios, because they can enter to different wireless networks and use the air like transmission medium, being vulnerable to possible attacks to the transmission of data. Several security architectures have been standardized for different networks, such as IEEE 802.11i-2004 for WLANs (Wireless Local Area Networks) and IEEE 802.16e-2005 for WMANs (Wireless Metropolitan Area Networks), operating on the MAC (Medium Access Control) sublayer. In this work, hardware implementations of these architectures are evaluated in terms of FPGA implementation costs and performance to be considered in a reconfigurable hardware platform, which supports both security architectures, working on the MAC...
Control Theory and Informatics, 2015
Wireless networks provide convenient and low cost mechanism for connecting network devices. They are ideal since they do not require physical connections .They therefore helps overcome the port limitations of the physical hardware. Any device that has radio receiver can detect these wireless signals as the wireless router transmits the signals uniformly in all directions. The ease with which connections can be established exposes wireless networks to many attacks. The authentication protocols have been developed to deter any illicit access to wireless networks, Wi-Fi Protected Access version 2 being one of them. The objective of this research paper was to demonstrate that one can still break the Confidentiality, Integrity and Availability (CIA) triad in the presence of this authentication protocol. The set up was implemented in Ubuntu 12.04 operating system using Ettercap, File2air, Khexedit , Wireshark and Airodump-ng from Aircrack-ng suite. The results indicated that WPA2 does no...
Wifi device uses security authentication protocol even though they are having some weakness. Generally wep, wpa protocols are used for security purpose. This is already proved that WEP authentication protocol is a weak protocol. By analyzing weakness of wep the concept of WPA and WPA2 developed. In this paper, we will examine the weak-nesses of "Strong WPA/WPA2 Authentication" and see how easy it is to crack the protocol. We will take a look at the new standard's WPA and WPA2 implementations along with their first minor vulnerabilities and how it is possible to crack it. Index Terms—WEP,WPA,WPA2,Aircrack-ng,John-the-ripper,wordfield,reaver I.INTRODUCTION WEP,WPA and WPA2 are the authentication protocols are used for security of wireless network. Researchers had found various weaknesses in WEP old system .To overcome that its place is taken by WPA and WPA2.Today world says that WPA and WPA2 are very strong protocols providing good security. First we will see the brief h...
2019
This chapter presents a new cross-layer security scheme which deploys efficient coding techniques in the physical layer in an upper layer classical cryptographic protocol system. The rationale in designing the new scheme is to enhance securitythroughput trade-off in wireless networks which is in contrast to existing schemes which either enhances security at the detriment of data throughput or vice versa. The new scheme is implemented using the residue number system (RNS), nonlinear convolutional coding and subband coding at the physical layer and RSA cryptography at the upper layers. The RNS reduces the huge data obtained from RSA cryptography into small parallel data. To increase the security level, iterated wavelet-based subband coding splits the ciphertext into different levels of decomposition. At subsequent levels of decomposition, the ciphertext from the preceding level serves as data for encryption using convolutional codes. In addition, throughput is enhanced by transmitting...
Computer and Network Security [Working Title]
This chapter presents a new cross-layer security scheme which deploys efficient coding techniques in the physical layer in an upper layer classical cryptographic protocol system. The rationale in designing the new scheme is to enhance securitythroughput trade-off in wireless networks which is in contrast to existing schemes which either enhances security at the detriment of data throughput or vice versa. The new scheme is implemented using the residue number system (RNS), nonlinear convolutional coding and subband coding at the physical layer and RSA cryptography at the upper layers. The RNS reduces the huge data obtained from RSA cryptography into small parallel data. To increase the security level, iterated wavelet-based subband coding splits the ciphertext into different levels of decomposition. At subsequent levels of decomposition, the ciphertext from the preceding level serves as data for encryption using convolutional codes. In addition, throughput is enhanced by transmitting small parallel data and the bit error correction capability of non-linear convolutional code. It is shown that, various passive and active attacks common to wireless networks could be circumvented. An FPGA implementation applied to CDMA could fit into a single Virtex-4 FPGA due to small parallel data sizes employed.
Security Trends for FPGAS, 2011
Security is becoming since several years a major issue in the domain of embedded systems. Fine grain reconfigurable architectures like FPGAs are providing many interesting features to be selected as an efficient target for embedded systems when security is an important concern. In this chapter we propose an overview of some existing attacks, a classification of attackers and the different levels of security as promoted by the FIPS 140-2 standard. We identify the main vulnerabilities of FPGAs to tackle the security requirements based on the security pyramid concept. We propose a presentation of some existing countermeasures at the different levels of the security pyramid to guarantee a defense-in-depth approach.
Procedia Computer Science, 2015
In recent years, a significant increasing in development of Wireless networks is noticed; they become an entire part of the Internet and demonstrate effectiveness in handling communication for reduced public LAN and military applications. This is mainly due to their mobility and low cost solutions; nevertheless, they are also prone to several attacks related to data integrity, Deni of Service and eavesdropping. This paper discusses wireless security protocols, their limitations and weakness. We present also an overview of the FMS (Fluhrer, Mantin, Shamir), a recovery key attack and demonstrate its effectiveness in reducing the average number of intercept packets based on a well choice of IV (initialization vectors). Some comparative experiments on ciphertext-only attacks were performed in order to study the efficiency of such technique and underline encountered difficulties.
These days wireless communication is basic need of people. Users want to secure their important information. For security purpose different kinds of protocols are available. But fast development in codes, standards and technology gives opportunity to hack and steal the important information over wireless network. Therefore the security of network should be in consideration. Today there exist different kinds of tools and programs inbuilt in operating system. By using them and analyzing weaknesses of protocol used, cracking of protocol is easy. In this paper we will learn authentication WPA standard and way to crack WPA.
Communication Systems and …, 2007
Wireless LANs have gone through rapid changes with respect to their security architecture in recent years. One view has been to incorporate WLANs under already existing VPN umbrellas and to view them merely as an alternative access method -thus preserving existing VPN infrastructure. Another view has been to address the security of the airwaves which has been demonstrated to be extremely vulnerable. The evolution of security standardisation based upon the work of the IEEE has evolved from WEP to WPA which introduced new key management and integrity mechanisms through to WAP2 (IEEE 802.11i) which maintains the management and integrity mechanisms of WPA but introduces AES encryption as well as moving much of the security functionality to the hardware. This paper traces the evolution and development of this new WLAN security architecture.
2018
The presence of wireless communication grows undeniably more prevalent each year. Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks (WLAN) in 1997, technologies have progressed to provide wireless accessibility to industries and consumers with growing ease and convenience. As the usage of personal devices, such as phones and watches, that connect to the Internet through Wi-Fi increases, wireless attacks on users are becoming more critical. This paper provides a novel attack model to offer an organized and comprehensive view of the possible attacks on WiFi latest security standards. All exiting attacks will be investigated, with emphasis on more recent attacks, such as the KRACK and PMKID Dictionary attacks. This paper will then analyze the technology offered in the new Wi-Fi Protected Access III (WPA3) security scheme and provide a comprehensive security analysis and discussion to determine whether it has addressed the vulnerabilities of its predece...
2012 5th International Conference on New Technologies, Mobility and Security (NTMS), 2012
Office State Commercial Cryptography Administrator (OSCCA) in China has specified SMS4 block cipher, as the encryption standard of wireless local area networks. This work, introduces architectural optimizations for this standard, regarding performance, allocated resources, and covered area for the efficient hardware implementation of it. Furthermore, the hardware integrations of the proposed architectures are introduced based on the FPGA implementation platform. The proposed integrations are fully compared in detail, with similar published works, in the terms of throughput, frequency, time delays, allocated resources and covered area. These detailed comparisons prove the superiority of the proposed ones, according to the design needs and implementations targets each time. Finally, comparisons with the AES encryption standard are also presented.
2004
Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. This paper describes the technical evolution of wireless security and introduces the future 802.11i with the most recent IEEE draft.
International Conference on Computer Networks and Information Technology, 2011
Wireless communication is highly susceptible to security outbreaks with shear advancement in signal processing technology foUowed by immense deployment of high-speed mobile communication networks. Pitfalls in current architecture of IEEE 802.16 or Worldwide Interoperability for Microwave Access (WiMAX) have been put forth in recent literature, based on analytical reasoning and design methodologies. With identification of these vulnerabilities, some solutions have also been proposed for their rectification; however, the experimental assessment of these solutions has not been carried out in appropriate manners to justify the satisfaction of constraints. In this paper, we present a generic methodology to simulate and analyze the authentication protocols in WiMAX based on obtained results. We focus on the 1 st and 2n d version of Privacy & Key Management (PKM) Protocols, which are implemented in the WiMAX architecture at present and compare their performance characteristics with another proposed solution ISNAP; which claims to eradicate most of the existing threats with introducing minimum overheads.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.