| Item type |
デフォルトアイテムタイプ_(フル)(1) |
| 公開日 |
2023-03-18 |
| タイトル |
|
|
タイトル |
Falsification Attacks against WPA-TKIP in a Realistic Environment |
|
言語 |
en |
| 作成者 |
Todo, Yosuke
Ozawa, Yuki
Ohigashi, Toshihiro
Morii, Masakatu
|
| アクセス権 |
|
|
アクセス権 |
open access |
|
アクセス権URI |
http://purl.org/coar/access_right/c_abf2 |
| 権利情報 |
|
|
権利情報 |
Copyright (c) 2012 The Institute of Electronics, Information and Communication Engineers |
| 主題 |
|
|
主題Scheme |
Other |
|
主題 |
wireless LAN network |
| 主題 |
|
|
主題Scheme |
Other |
|
主題 |
WPA-TKIP |
| 主題 |
|
|
主題Scheme |
Other |
|
主題 |
falsification attack |
| 主題 |
|
|
主題Scheme |
Other |
|
主題 |
QoS |
| 主題 |
|
|
主題Scheme |
Other |
|
主題 |
vulnerability |
| 主題 |
|
|
主題Scheme |
NDC |
|
主題 |
000 |
| 内容記述 |
|
|
内容記述 |
In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). A previous realistic attack succeeds only for a network that supports IEEE 802.11e QoS features by both an access point (AP) and a client, and it has an execution time of 12-15min, in which it recovers a message integrity code (MIC) key from an ARP packet. Our first attack reduces the execution time for recovering a MIC key. It can recover the MIC key within 7-8min. Our second attack expands its targets that can be attacked. This attack focuses on a new vulnerability of QoS packet processing, and this vulnerability can remove the condition that the AP supports IEEE 802.11e. In addition, we discovered another vulnerability by which our attack succeeds under the condition that the chipset of the client supports IEEE 802.11e even if the client disables this standard through the OS. We demonstrate that chipsets developed by several kinds of vendors have the same vulnerability. |
|
言語 |
en |
| 出版者 |
|
|
出版者 |
一般社団法人電子情報通信学会 |
| 言語 |
|
|
言語 |
eng |
| 資源タイプ |
|
|
資源タイプ識別子 |
http://purl.org/coar/resource_type/c_6501 |
|
資源タイプ |
journal article |
| 出版タイプ |
|
|
出版タイプ |
VoR |
|
出版タイプResource |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
| 関連情報 |
|
|
|
識別子タイプ |
DOI |
|
|
関連識別子 |
10.1587/transinf.E95.D.588 |
| 関連情報 |
|
|
|
識別子タイプ |
DOI |
|
|
関連識別子 |
http://dx.doi.org/10.1587/transinf.E95.D.588 |
| 収録物識別子 |
|
|
収録物識別子タイプ |
ISSN |
|
収録物識別子 |
0916-8532 |
| 収録物識別子 |
|
|
収録物識別子タイプ |
NCID |
|
収録物識別子 |
AA10826272 |
| 開始ページ |
|
|
開始ページ |
588 |
| 書誌情報 |
IEICE Transactions on Information and Systems
IEICE Transactions on Information and Systems
巻 E95D,
号 2,
p. 588-595,
発行日 2012
|
| 旧ID |
33920 |