Skip to main content

The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Abstract

The IEEE 802.11i is the security standard to solve the security problems of WLAN, in which, the protocol 4-way handshake plays a very important role in the authentication and key agreement process. In this paper, we analyzed the security of protocol 4-way handshake with the Canetti-Krawczyk (CK) model, a general framework for constructing and analyzing authentication protocols in realistic models of communication networks. The results show that 4-way handshake protocol can not only satisfy the definition of Session Key security defined in the CK model, but also the universal composition security, a stronger definition of security. So it can be securely used as the basic model of the authentication and key agreement of WLAN.

Research supported by the National Natural Science Foundation of China (Grant No. 90204012), the National “863” High-tech Project of China (Grant No. 2002AA143021), the Excellent Young Teachers Program of Chinese Ministry of Education, the Key Project of Chinese Ministry of Education, and the University IT Research Center Project of Korea.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 802.11-1999., I.S., Information technology -Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control and Physical Layer Specifications (1999)

    Google Scholar 

  2. 802.11b-1999, I.S., Higher-Speed Physical Layer Extension in the 2.4 GHz Band, Supplement to IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1999)

    Google Scholar 

  3. IEEE P802.11i D3.0, Specification for Enhanced Security (2002)

    Google Scholar 

  4. Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol (RFC 2716) (1999)

    Google Scholar 

  5. 802.1X-2001, I.S., IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control (2001)

    Google Scholar 

  6. Rigney, C., et al.: Remote Authentication Dial in User Service (RADIUS). RFC 2865 (2000)

    Google Scholar 

  7. Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: The 7th Annual International Conference on Mobile Computing and Networking, Italy (2001)

    Google Scholar 

  8. Changhua, H., Mitchell, C.J.: Analysis of the 802.11i 4-Way Handshake. In: Proceedings of WiSe 2004, Philadelphia, Pennsylvania, USA, October 1 (2004)

    Google Scholar 

  9. Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 453. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, p. 337. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Lindell, Y.: Composition of secure multi-party protocols - A comprehensive study. LNCS, vol. 2815. Springer, Heidelberg (2003)

    Book  MATH  Google Scholar 

  12. Lindell, Y.: General Composition and Universal Composability in Secure Multi-Party Computation. In: 44th FOCS (2003)

    Google Scholar 

  13. Canetti, R.: Universally composable security: a new paradigm for cryptographyic protocol. In: 42nd FOCS (2001)

    Google Scholar 

  14. Canetti, R., et al.: Universally Composable Two-party and Muti-party Secure Computation. In: 34th STOC (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, F., Ma, J., Moon, S. (2005). The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_72

Download citation

  • DOI: https://doi.org/10.1007/11596981_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics