Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization

The Wi-Fi Protected Access 2 (WPA2) is the most secured and recommended protocol for wireless networks today. WPA2 addressed the vulnerabilities of previous protocols wired equivalent privacy (WEP) and Wi-Fi protected access (WPA). WPA2 implemented block

  • PDF / 309,352 Bytes
  • 7 Pages / 439.37 x 666.142 pts Page_size
  • 19 Downloads / 175 Views

DOWNLOAD

REPORT


Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization Swati Sukhija and Shilpi Gupta

Abstract The Wi-Fi Protected Access 2 (WPA2) is the most secured and recommended protocol for wireless networks today. WPA2 addressed the vulnerabilities of previous protocols wired equivalent privacy (WEP) and Wi-Fi protected access (WPA). WPA2 implemented block cipher AES to provide stronger encryption but it is still vulnerable to various attacks due to transmission of unencrypted management and control frames and group key sharing among peers connected to wireless network. With the rapid popularity of wireless networks, secure transmission of data is extremely essential. The solution for WPA2 shortcomings has been proposed and implemented in this paper and thus, provides protection to wireless networks from several attacks. Keywords Advanced encryption standard (AES) protocol (EAP) Robust security network (RSN) (WPA2)



 

Extensible authentication Wi-Fi protected access 2

44.1 Introduction Solutions for WPA2 vulnerabilities have been discussed in this paper by incorporating trusted computing in order to provide security for wireless networks. Trusted computing aims at addressing the workstation security issues by some S. Sukhija (&)  S. Gupta Department of Computer Science and Engineering, Amity University, Noida, India e-mail: [email protected] S. Gupta e-mail: [email protected]

V. V. Das (ed.), Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing, Lecture Notes in Electrical Engineering 150, DOI: 10.1007/978-1-4614-3363-7_44,  Springer Science+Business Media New York 2013

391

392

S. Sukhija and S. Gupta

software amendments and thus, establishing a trust relationship between clients connected to network. Trusted computing enables binding of data to applications, users and workstations [1].

44.2 Wi-Fi Protected Access 2 (WPA2)/IEEE 802.11i IEEE 802.11i was proposed in 2004 as solution for IEEE 802.11 and was completely implemented by Wi-Fi Protected Access 2 (WPA2) thus, providing enhancement over Wi-Fi Protected Access (WPA). Counter mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) was introduced in WPA2 to provide data encryption with Advanced Encryption Standard (AES) block cipher. The encryption standard Temporal Key Integrity Protocol (TKIP) is also available for legacy WPA supported devices. WPA2 suffers from various vulnerabilities which are as follows.

44.2.1 Unencrypted Control Frames Control frames are unencrypted and are thus, prone to Denial of Service (DoS) attacks [2]. Control frames aid in data frames delivery and used for acknowledgement of received data and acquisition of channel. Various control frames are Request to Send (RTS), Clear to Send (CTS), Acknowledgement and Power Save Poll [3].

44.2.2 Unencrypted Management Frames Management frames are unencrypted, thus providing the attacker the means to analyze network layout leading to possibility of a DoS attack [2]. These frames a