Companion Proceedings of the Web Conference 2020 2020
DOI: 10.1145/3366424.3383545
|View full text |Cite
|
Sign up to set email alerts
|

Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…In [37], the authors proposed a defense mechanism based on Physically Unclonable Functions (PUF) to prevent rogue AP's actions during the MC-MitM attacks. Their approach involved generating a unique secret key from the AP's PUF signature and using it for mutual authentication between the AP and client devices.…”
Section: ) Stage 1 Defense Mechanismsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [37], the authors proposed a defense mechanism based on Physically Unclonable Functions (PUF) to prevent rogue AP's actions during the MC-MitM attacks. Their approach involved generating a unique secret key from the AP's PUF signature and using it for mutual authentication between the AP and client devices.…”
Section: ) Stage 1 Defense Mechanismsmentioning
confidence: 99%
“…Stupify [37] only detects attacks against WPA2 devices because it introduces changes to the WPA2 authentication mechanisms. It does not protect PMF devices as they do not include a group key (IGTK) in their authentication mechanism, and cannot detect insider attacks since such attackers can forge/bypass authentication details.…”
Section: G Comparison With Existing Defense Mechanismsmentioning
confidence: 99%
“…In the above scenarios, it is challenging to distinguish MC-MitM attacks correctly. Some significant defense mechanisms [7], [16], [26], [27] have been proposed in the literature. Generally, such defense mechanisms practice cryptographic authentication of communication channels, beacons, or devices to identify intrusions.…”
Section: A Challenges In Detecting Mc-mitm Attacksmentioning
confidence: 99%
“…Chatterjee et al [26] proposed a Physically Unclonable Functions (PUF) based defense to prevent rogue AP's actions during the MC-MitM attack. Their basic idea was to generate a unique secret key from the AP's PUF signature and use it to authenticate devices (the AP and client) mutually.…”
Section: ) Stage 1 Defense Mechanisms: Vanhoef Et Al [7] Proposed An ...mentioning
confidence: 99%
“…Therefore, device authentication for Wi-Fi network security is indispensable [7,8]. IEEE 802.11i provides cryptographicbased device authentication methods, but it has been proven to lack security [9][10][11][12]. What is more, Wi-Fi devices with limited hardware resources cannot support these authentication schemes well, which brings challenges to the usage of cryptographic-based device authentication technology.…”
Section: Introductionmentioning
confidence: 99%