このエントリーをはてなブックマークに追加
ID 33920
本文ファイル
著者
Todo, Yosuke
Ozawa, Yuki
Morii, Masakatu
キーワード
wireless LAN network
WPA-TKIP
falsification attack
QoS
vulnerability
NDC
総記
抄録(英)
In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). A previous realistic attack succeeds only for a network that supports IEEE 802.11e QoS features by both an access point (AP) and a client, and it has an execution time of 12-15min, in which it recovers a message integrity code (MIC) key from an ARP packet. Our first attack reduces the execution time for recovering a MIC key. It can recover the MIC key within 7-8min. Our second attack expands its targets that can be attacked. This attack focuses on a new vulnerability of QoS packet processing, and this vulnerability can remove the condition that the AP supports IEEE 802.11e. In addition, we discovered another vulnerability by which our attack succeeds under the condition that the chipset of the client supports IEEE 802.11e even if the client disables this standard through the OS. We demonstrate that chipsets developed by several kinds of vendors have the same vulnerability.
掲載誌名
IEICE Transactions on Information and Systems
E95D巻
2号
開始ページ
588
終了ページ
595
出版年月日
2012
出版者
一般社団法人電子情報通信学会
ISSN
0916-8532
NCID
出版者DOI
言語
英語
NII資源タイプ
学術雑誌論文
広大資料タイプ
学術雑誌論文
DCMIタイプ
text
フォーマット
application/pdf
著者版フラグ
publisher
権利情報
Copyright (c) 2012 The Institute of Electronics, Information and Communication Engineers
関連情報URL
部局名
情報メディア教育研究センター