Towards improving the security of wireless networks using secured session keys

被引:0
|
作者
Amma, N. G. Nageswari [1 ]
Jayaraj, T. [2 ]
Amma, N. G. Bhuvaneswari [3 ]
机构
[1] Muslim Arts Coll, Dept Comp Sci, Kanyakumari, India
[2] Govt Arts & Sci Coll, Dept Comp Sci, Sankarancoil, Tenkasi, India
[3] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
AES; Diffie-Hellman; mobile nodes; session keys; wireless networks;
D O I
10.1080/19393555.2024.2347682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Networks are mostly based on the IEEE 802.11 standards and with so many applications being wireless, without proper security, sensitive information may be at risk. Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are two of the most commonly used mechanisms for implementing security in wireless networks. However, research has shown that both of these can be cracked quite easily within a short period as these mechanisms use a key-based security implementation for performing operations. The key can be found by capturing a few packets and hence security is compromised. In this study, the solution that is proposed by generating a secured session key using the Advanced Encryption Standard (AES) algorithm, which is valid only for a specific session and cannot be cracked easily by the intruder, and hence will not affect the security of the entire network. The key exchange is made by the Diffie-Hellman key exchange protocol. The proposed solution was implemented over a network and found to be secure.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Analysis of Security Algorithms towards secured communication in Wireless Networks
    Kumari, E. Hemalatha Jai
    Kannammal, A.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [2] Group key management in wireless networks using session keys
    Damodaran, Dhilak
    Singh, Rohit
    Le, Phu Dung
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 402 - +
  • [3] Forum session: Security for wireless sensor networks
    Carman, D
    Swarup, V
    Coffin, D
    Watro, R
    Dutertre, B
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 106 - 107
  • [4] Improving the security of SNMP in wireless networks
    Otrok, H
    Mourad, A
    Debbabi, A
    Assi, C
    [J]. 2005 International Conference on Wireless Networks, Communications and Mobile Computing, Vols 1 and 2, 2005, : 198 - 202
  • [5] A Security Framework for NoC Using Authenticated Encryption and Session Keys
    Kapoor, Hemangee K.
    Rao, G. Bhoopal
    Arshi, Sharique
    Trivedi, Gaurav
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2013, 32 (06) : 2605 - 2622
  • [6] A Security Framework for NoC Using Authenticated Encryption and Session Keys
    Hemangee K. Kapoor
    G. Bhoopal Rao
    Sharique Arshi
    Gaurav Trivedi
    [J]. Circuits, Systems, and Signal Processing, 2013, 32 : 2605 - 2622
  • [7] Wireless Security - An Approach Towards Secured Wi-Fi Connectivity
    Pimple, Nishant
    Pawar, Utkarsha
    Salunke, Tejashree
    Sangoi, Janhavi
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 872 - 876
  • [8] Analysis and Evaluation of Wireless Networks by Implementation of Test Security Keys
    Rahman, Arifur
    Ali, Maaruf
    [J]. EMERGING TECHNOLOGIES IN COMPUTING, ICETIC 2018, 2018, 200 : 107 - 126
  • [9] Improving Adhoc wireless sensor networks security using distributed automaton
    Venkatraman, S.
    Kumar, P. Arun Raj
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 14551 - 14557
  • [10] Improving Adhoc wireless sensor networks security using distributed automaton
    S. Venkatraman
    P. Arun Raj Kumar
    [J]. Cluster Computing, 2019, 22 : 14551 - 14557