418 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author조성현-
dc.date.accessioned2019-04-29T00:30:12Z-
dc.date.available2019-04-29T00:30:12Z-
dc.date.issued2016-10-
dc.identifier.citation2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), Page. 1-4en_US
dc.identifier.isbn978-1-5090-2743-9-
dc.identifier.urihttps://ieeexplore.ieee.org/document/7804782/-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/102792-
dc.description.abstractThis paper proposes authentication and key exchange scheme to communicate between users securely in small scale Wi-Fi networks. Depend on the Wi-Fi options, there can be various vulnerabilities in the network. Especially, most of small scale Wi-Fi networks have used the options which can cause several vulnerabilities. These Wi-Fi networks use passphrase for access authentication. However, these passphrases are known by the small network owner. In such circumstances, the network cannot assure security between users in the same network. In the existing Wi-Fi network, attackers in the same network can acquire pairwise keys by eavesdropping messages. Thus, this paper proposes the secure key exchange scheme to apply a public key cryptography. Using public key system, a station and an access point exchange a secondary key which user selects. This key is used for pairwise key generation. Through the proposed scheme, the network can protect users from several attacks in the same Wi-Fi network.en_US
dc.description.sponsorshipThis work was supported by the research fund of Signal Intelligence Research Center supervised by the Defense Acquisition Program Administration and Agency for Defense Development of Korea.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.subjectWi-Fien_US
dc.subjectWPAen_US
dc.subjectWPA2en_US
dc.subjectPSKen_US
dc.subjectAuthenticationen_US
dc.subjectPublic keyen_US
dc.subjectSecurityen_US
dc.subjectKey exchangeen_US
dc.titleSecure key exchange scheme for WPA/WPA2-PSK using public key cryptographyen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/ICCE-Asia.2016.7804782-
dc.relation.page1-4-
dc.contributor.googleauthorNoh, JW-
dc.contributor.googleauthorKim, JH-
dc.contributor.googleauthorKwon, GW-
dc.contributor.googleauthorCho, S.H-
dc.sector.campusE-
dc.sector.daehakCOLLEGE OF COMPUTING[E]-
dc.sector.departmentDIVISION OF COMPUTER SCIENCE-
dc.identifier.pidchopro-
Appears in Collections:
COLLEGE OF COMPUTING[E](소프트웨어융합대학) > COMPUTER SCIENCE(소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE