Implementation of three LWC Schemes in the WiFi 4-Way Handshake with Software Defined Radio

09/25/2019
by   Yunjie Yi, et al.
0

In this paper, we present the implementation setup of the IEEE 802.1X 4-way handshake mutual authentication and IEEE 802.11i amending protected communication by using lightweight cryptography (LWC) schemes. The cryptographic functions including message integrity check (MIC) code (or equivalently message authentication code), key deviation function, and authenticated encryption are implemented by each of three LWC schemes, i.e., ACE, SPIX, and WAGE, in three different types of microcontrollers: 8-bit (Atmega128), 16-bit (MSP430f2013/MSP430f22370) and 32-bit (Cortex-m3lm3s9d96) microcontrollers. Software defined radio (SDR), contained two Universal Software Radio Peripheral (USRP) devices, is used to setup 802.11a physical layer orthogonal frequency division multiplexing (OFDM) transmission systems for the devices. We provide the experimental timing including cryptographic operations, OFDM modulation and radio transmission in the air.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/20/2018

An SDR Implementation of a Visible Light Communication System Based on the IEEE 802.15.7 Standard

The aim of this paper is to present an implementation of a functional IE...
research
02/22/2019

Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio

This article discusses the available Software Defined Radios (SDRs), com...
research
11/08/2022

Computational indistinguishability and boson sampling

We introduce a computational problem of distinguishing between the outpu...
research
06/15/2023

Open Source-based Over-The-Air 5G New Radio Sidelink Testbed

The focus of this paper is the prototype development for 5G new radio (N...
research
03/07/2019

Real-Time Experimental Demonstration of Multi-band CAP Modulation in a VLC System with Off-the-Shelf LEDs

We demonstrate, for the first time, m-CAP modulation using off-the-shelf...
research
04/28/2020

Specifying a Cryptographical Protocol in Lustre and SCADE

We present SCADE and Lustre models of the Message Authenticator Algorith...
research
09/21/2020

On Software Implementation of Gabidulin Decoders

This work compares the performance of software implementations of differ...

Please sign up or login with your details

Forgot password? Click here to reset