Enhancing WPA2-PSK four-way handshaking after re-authentication to deal with de-authentication followed by brute-force attack a novel re-authentication protocol.
Mohamed Chahine GhanemDeepthi N. RatnayakePublished in: CyberSA (2016)
Keyphrases
- authentication protocol
- brute force
- smart card
- authentication mechanism
- security analysis
- authentication scheme
- public key
- user authentication
- lightweight
- secret key
- security protocols
- password authentication
- key distribution
- rfid tags
- ban logic
- computationally expensive
- trusted third party
- hash functions
- rfid systems
- session key
- image compression