Security Analysis of Modern Wi-fi Network Protection Protocols: Assessment of Wpa3 Protocol Resistance During Attacks Based on Dragonblood Utility

2024;
: pp. 133 - 147
1
Lviv Polytechnic National University, Department of Information Protection
2
Lviv Polytechnic National University, Department of Information Protection
3
Lviv Polytechnic National University, Department of Information Protection

With the constant development of information technology and the growing threat of cyber attacks, the security of Wi-Fi wireless networks is of particular relevance. This article aims to provide an in-depth analysis of modern Wi-Fi security protocols such as WPA2, WPA3, and OWE, focusing on their strengths and weaknesses in securing the network against the most common types of attacks.

This paper looks at wireless network security threats, including man-in-the-middle attacks, Wi-Fi access point phishing, and exploits that target specific security mechanisms. An important part of the research is a description of test methods, attack tools such as Aircrack-ng and Wireshark, and a detailed analysis of the results obtained.

This work focuses on a detailed security analysis of the WPA3 protocol, using Dragonblood utilities to identify possible vulnerabilities in its implementation. Through targeted attacks and simulations that mimic real-world cyberattacks, the goal is to identify potential breaches of secure wireless networks using WPA3. This allows us to evaluate the effectiveness of the encryption and authentication mechanisms used within the framework of this standard and develop recommendations for increasing the level of security of information systems. During the study, practical experiments will be conducted to modify the code of the wireless access point server, and data obtained using the Wireshark program will be analyzed to assess the impact of attacks on the functionality of the network. The results of the work highlight the need for continuous improvements in Wi-Fi security technologies to provide reliable security in the face of growing cyber threats.

  1. Wi-Fi Alliance. (2022). Wi-Fi Easy Connect™ Specification v3.0. [Online]. Available at: https://www.wi- fi.org/system/files/Wi-Fi_Easy_Connect_Specification_v3.0.pdf
  2. Wi-Fi Alliance. (May 2021). Wi-Fi Protected Access® Security Considerations. [Online]. Available at: https://www.wi-fi.org/system/files/Security_Considerations_20210511.pdf
  3. Wi-Fi Alliance. (n.d.). WPA3™ Specification Version 3.1. Available at: https://www.wi- fi.org/system/files/WPA3%20Specification%20v3.3.pdf
  4. IEEE Standards Association. (n.d.). Available at: https://standards.ieee.org/news/ieee_802_11ak-2018/
  5. Vanhoef M., & Ronen E. (2019). Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP- pwd. New York University Abu Dhabi; Tel Aviv University & KU Leuven. [Online]. Available at: https://papers.mathyvanhoef.com/dragonblood.pdf
  6. White Paper: Networking | Security. Seamless Next-generation Wi-Fi Security Through Multivendor End- to-end WPA3 Verification. (2021). Available at: https://www.intel.com/content/dam/support/us/en/documents/ wireless/intel-whitepaper-wifi-security-through-wpa3-verification.pdf
  7. Stallings W. (2005). Wireless Communications and Networks (2nd ed.). Upper Saddle River, NJ: Pearson Prentice Hall. ISBN 0-13-191835-4. Available at: http://182.74.60.194/opac-tmpl/bootstrap/images/link/ebook/ Computer%20Science/Wireless%20Communications%20and%20Networking.pdf
  8. Pothuganti K., & Chitneni A. (2014). A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee,                   and     Wi-Fi.     Advance     in     Electronic        and     Electric        Engineering,    4(6),     655-662.     Available at:https://www.researchgate.net/publication/312471356_A_comparative_study_of_wireless_protocols_Bluetooth_U WB_ZigBee_and_Wi-Fi
  9. Sharma K., & Dhir N. (2014). A Study of Wireless Networks: WLANs, WPANs, WMANs, and WWANs with Comparison. International Journal of Computer Science and Information Technologies, 5(6), 7810-7813. Available at:                    https://www.academia.edu/25106472/A_Study_of_Wireless_Networks_WLANs_WPANs_WMANs_and_ WWANs_with_Comparison
  10. Ciubotaru B., & Muntean G. M. (2013). Advanced Network Programming: Principles and Techniques. London: Springer-Verlag. ISBN 978-1-4471-5292-7. Available at: https://www.iqytechnicalcollege.com/Advanced% 20Network%20Programming%20-%20Principles%20and%20Techniques.pdf
  11. Digi International Inc. (2007–2008). An Introduction to Wi-Fi. Rabbit Product Manual. Available at: https://ftp1.digi.com/support/documentation/0190170_b.pdf
  12. Wi-Fi Alliance. (April 2023). Generational Wi-Fi® User Guide. [Online]. Available at: https://www.wi- fi.org/system/files/Generational_Wi-Fi_User_Guide_202304.pdf
  13. Kaveh Pahlavan, Prashant Krishnamurthy. (November 2020). Historical Perspective. International Journal of Wireless   Information   Networks,   28(6),   pp.   1–17.   [Online].   Available   at:   DOI:   10.1007/s10776-020-00501-8 https://www.researchgate.net/publication/347057817_Evolution_and_Impact_of_and_Impact_of_Wi-Fi_Technology_ and_Applications_A_Historical_Perspective