Security Analysis and Authentication Improvement for IEEE 802.11i Specification

The IEEE 802.11i amendment has been finalized to address the security issues in wireless local area networks. A prodigious amount of research has demonstrated that the IEEE 802.11i specification is sufficient to prevent unauthorized access and use. In this paper, we analyze the IEEE 802.11i wireless networking amendment with respect to data confidentiality, integrity, mutual authentication and availability. Our analysis indicates that a number of serious threats have still not been addressed by the 802.11i amendment. This includes DoS attacks, insider attacks, offline guessing attacks, etc. Furthermore, configuring security features on a commercial Wi-Fi network is moderately-to-very difficult. Towards this end, this paper proposes an improved authentication mechanism which adopts asymmetric cryptography and thus accomplishes link-layer frame protection. Through our further analysis and discussion, we conclude that the proposed mechanism not only prevents potential security threats but also accomplishes autonomic security configuration without human intervention.

[1]  Erik Tews,et al.  Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.

[2]  William A. Arbaugh,et al.  Security issues in IEEE 802.11 wireless local area networks: a survey , 2004, Wirel. Commun. Mob. Comput..

[3]  Sheila E. Frankel,et al.  Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .

[4]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[5]  John C. Mitchell,et al.  Analysis of the 802.11i 4-way handshake , 2004, WiSe '04.

[6]  Floriano De Rango,et al.  Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..

[7]  John C. Mitchell,et al.  A modular correctness proof of IEEE 802.11i and TLS , 2005, CCS '05.

[8]  Joon S. Park,et al.  WLAN Security: Current and Future , 2003, IEEE Internet Comput..

[9]  Aaron Striegel,et al.  Resolving WPA limitations in SOHO and open public wireless networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[10]  John C. Mitchell,et al.  Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.

[11]  Mark Handley,et al.  The final nail in WEP's coffin , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[12]  William A. Arbaugh,et al.  Security issues in IEEE 802.11 wireless local area networks: a survey: Research Articles , 2004 .

[13]  Philippe Oechslin,et al.  Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.