RSN Extended Information Element (RSNXE)

The RSNXE contains additional information needed to establish an Robust Security Network Association (RSNA). It is part of the beacon, probe response, association and re-association frames sent during Wi-Fi connection. It is a set of 1-bit fields (other than the first 4 bits indicates RSNXE length) which indicate whether a feature is supported or not […]

WPA3 Wireless capture excerpts for WPA3-SAE

SAE support is broadcast in the beacon frame and probe response by the access point in the RSN information element. The Wi-Fi station can decide if it wishes to connect with the access point by looking into the beacon and probe response frames. In case, the station supports SAE as well, it will send the […]

SAE handshake and commit-confirm messages

The SAE handshake is the 4-way authentication handshake that occurs instead of the earlier 2-way 802.11 authentication handshake. The 4-way handshake has two commit messages and two confirm messages in its 4-way handshake. The commit message sends out an scalar value, finite element and the DH group being used in the handshake. for reference, the […]

Diffie-Hellman (DH) handshake

The Dragonfly handshake in Wi-Fi is used to generate a unique Pairwise Master Key (PMK) for each pair of associated Wi-Fi Stations. This circumvents the problem of the same PMK being generated for all stations when using WPA2 personal security connection. The Dragonfly handshake is based on the Diffie-Hellman (DH) handshake. The DH handshake uses […]

WPA3-Personal security changes

The WPA2-Personal Pairwise Master key generation is based on the Password Based Key Derivation Function version 2 (PBKDF2) (WPA2 PBKDF2 mechanism), which is later used to generate Unicast and group temporal keys used in encrypting traffic using the 4-way handshake. The PMK generated using PBKDF2 follows a hashing algorithm that creates the same Pairwise Master […]

WPA3 security

Wireless Protected Access 3 (WPA3) is the latest security standard certification from Wi-Fi. It was observed that WPA2-Personal which is normally used in most home Wi-Fi networks was susceptible to offline dictionary attacks having weak passwords. A few vulnerabilities such as KRACK (Key re-installation attack) and HOLE196 (which allowed malicious clients to send group encrypted […]

Internet of Things (IoT)

In these series of articles, I will attempt to collate certain requirements and workings of software for Internet of Things (IoT) devices. IoT devices are devices that contain sensors and embedded software interacting with those sensors to provide/collect data, receive networking commands and perform specific tasks without human intervention. One of the core tenets of […]

Unnamed Semaphore in Linux User space

As the name suggests, the semaphore does not have a name in the Linux File system. These semaphores are also called as memory-based semaphores. since, the semaphore does not have a name associated with it in the Linux File system, the semaphore needs to be placed in a shared memory region that different processes or […]

Named Semaphore in Linux user space

Named semaphores as the name suggests have a name in the Linux file system. Hence different unrelated processes or threads can open the semaphore by invoking the name. The Named semaphore can be created or an existing instance opened by invoking the “sem_open” API. The API is shown below The name identifies the semaphore. The […]