当前位置:主页 > 科技论文 > 信息工程论文 >

Effective Schemes to Prevent Attacks Due to Four Ways Handsh

发布时间:2021-02-08 12:37
  随着互联网攻击日渐增多,对更强大系统和复杂工具的需求也越来越多,这些系统和工具要具备漏洞分析,入侵检测,深层检查和预期响应等功能。当前的黑客工具和技术需要通过再造来解决网络犯罪和国土安全问题,因此了解网络的缺陷以保护信息基础设施就尤为必要。这就需要收集网络拓扑,智能,内部/外部漏洞分析和渗透测试来完成。主要目标是将攻击伤害降至最低并防止攻击者利用四次握手(WIFI)中的弱点和漏洞。但问题是,同一网络中的所有站点在关联后具有相同的预共享密钥。攻击者可以通过窃听四次握手程序(4路握手程序)来获得加密密钥。在上述方案中,我们引入椭圆曲线公钥加密概念保持密钥安全。本文旨在解释并给出一些替代方法来预防包括密钥恢复攻击(KRACK)、中间人、去认证攻击降级和DoS攻击在内的攻击。这些攻击利用了在通过IEEE802.11i建立连接时使用的4次握手过程的身份验证阶段中的漏洞,因此我们在四次握手过程强型四次握手过程,并会做进一步的讨论。在所提出的方案中,只有接入点(AP)具有其公钥和私钥对,该方案通过交换每个站在认证过程期间确定或生成的二级密钥来解决攻击问题。在我们的方案中,辅助密钥在被发送到AP之前由... 

【文章来源】:杭州电子科技大学浙江省

【文章页数】:76 页

【学位级别】:硕士

【文章目录】:
摘要
ABSTRACT
List of Abbreviations
Chapter 1:Introduction
    1.1 History of WLAN and evolution of WIFI security Protocol
    1.2 Research Question
    1.3 Scope
Chapter 2:Security protocol for WLAN
    2.1 IEEE 802.11 Standards for WLAN
    2.2 Wired Equivalent Privacy: WEP
        2.2.1 Encryption of information
        2.2.2 Decryption of Information at Receiving Side
    2.3 The 802.1 1istandard
    2.4 Wireless Protected Acces:WPA
        2.4.1 WPA Architecture
    2.5 Wireless Protected AccesⅡ: WPA2
        2.5.1 WPA2 architecture
    2.6 Wireless Protected Access Version 3
    2.7 Chapter Summary
Chapter 3:Vulnerabilities security protocol and survey of recent attacks
    3.1 Vulnerabilities of WEP
    3.2 Vulnerabilities of WPA
    3.3 Vulnerabilities of WPA2
    3.4 Survey of Recent Attacks
        3.4.1 Block 1 Attacks
        3.4.2 Block 2 of Attacks
        3.4.3 Block 3 of Attacks
        3.4.4 Block 4 of Attacks
        3.4.5 Different Outcomes from Attacks
    3.5 Chapter summary
Chapter 4:Proposed Scheme implementation and Evaluation
    4.1 Related Work
    4.2 Proposed Model Implementation
        4.2.1 Description of Our Proposed Model
        4.2.2 Preliminary Knowledge for Elliptic Curve Cryptographic (ECC)
        4.2.3 WI-FI Access Authentication Procedure
        4.2.4 Proposed 4-Way Handshake Procedure
    4.3 Security Overhead Analysis
        4.3.1 Formal Verification of Our Schemes with BAN Logic
        4.3.2 Security Enhancement Analysis against Classic Attacks
        4.3.3 Overheads Analysis,Evaluations and Comparison
    4.4 Comparison approach with recent research
Chapter 5:Conclusion
Acknowledgements
References
Appendix



本文编号:3023931

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/3023931.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户46da3***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com