N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication


KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 6, pp. 197-208, Jun. 2023
https://doi.org/10.3745/KTCCS.2023.12.6.197,   PDF Download:
Keywords: Blockchain, NFT, Wireless LAN, WPA2, Wi-Fi, hacking, Security
Abstract

In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
T. Eun, A. Saad, S. Park, "N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication," KIPS Transactions on Computer and Communication Systems, vol. 12, no. 6, pp. 197-208, 2023. DOI: https://doi.org/10.3745/KTCCS.2023.12.6.197.

[ACM Style]
Tae-Young Eun, Alshihri Saad, and Soo-Yong Park. 2023. N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication. KIPS Transactions on Computer and Communication Systems, 12, 6, (2023), 197-208. DOI: https://doi.org/10.3745/KTCCS.2023.12.6.197.