A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP
نویسنده
چکیده
This paper proposes a highly efficient cryptographic denial of service attack against 802.11 networks using 802.11i TKIP and CCMP. The attacker captures one frame, then modifies and transmits it twice to disrupt network access for 60 seconds. We analyze, implement and experimentally validate the attack. We also propose a robust solution and recommendations for network administrators.
منابع مشابه
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
Temporal Key Integrity Protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in Wired Equivalent Privacy (WEP) Protocol. TKIP adds four new algorithms to WEP: a Message Integrity Code (MIC) called Michael, an Initialization Vector (IV) sequencing discipline, a key mixing function and a re-keying mechanism. The key mixing function, also called temporal key hash, de...
متن کاملSecurity of IEEE 802.11 considering Power and EM Side-Channel Information
This paper introduces the side-channel perspective on wireless security. We assume an attacker is able to measure the power consumption or the electromagnetic emanation of cryptographic operations performed at the access point or at the station. Under this assumption, we review standards for wireless security like WEP as defined in IEEE 802.11b, and TKIP as defined in IEEE 802.11i. We furthermo...
متن کاملRobust and Low Latency Security Framework for Ieee 802.11 Wireless Networks by Muhammad Junaid
Wireless Networks call for enhanced confidentiality, integrity and authentication services because of their inherent weakness. 'Counter Mode Cipher Block Chaining Message Authentication Code Protocol' (CCMP) has recently been employed to replace flawed 'Wired Equivalent Privacy' (WEP) Protocol for the provision of security to IEEE 802.11 wireless local area networks (WLAN). Meanwhile, IEEE 802....
متن کاملSecurity Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model, 802.11i appears to provide effective data confidentiality and integrity when CCMP is used. Furthermore, 802.11i may provide satisfactory mutual authentication and key management, although there are some potential impl...
متن کاملA Novel Design and Implementation of Dos-Resistant Authentication and Seamless Handoff Scheme for Enterprise WLANs
With the advance of wireless access technologies, the IEEE 802.11 wireless local area network (WLAN) has gained significant increase in popularity and deployment due to the substantially improved transmission rate and decreased deployment costs. However, this same widespread deployment makes WLANs an attractive target for network attacks. Several vulnerabilities have been identified and reporte...
متن کامل