Asee peer logo

WPA3 Personal and Enterprise Wireless Security Algorithm Labs for Undergraduate Level

Download Paper |

Conference

2023 ASEE Annual Conference & Exposition

Location

Baltimore , Maryland

Publication Date

June 25, 2023

Start Date

June 25, 2023

End Date

June 28, 2023

Conference Session

Computing and Information Technology Division (CIT) Technical Session 9

Tagged Division

Computing and Information Technology Division (CIT)

Page Count

25

DOI

10.18260/1-2--44438

Permanent URL

https://peer.asee.org/44438

Download Count

351

Request a correction

Paper Authors

biography

Emil H. Salib James Madison University

visit author page

Professor in the College of Integrated Science & Engineering (CISE) at James Madison University (JMU).
Current Teaching - Networking, Network Security, Introductory Programming, Introductory Database Systems, Introductory Web Technology
Current Research - Virtualization & Cloud Computing, Blockchain Technology, Software Defined Network, Wireless Networking and Security

visit author page

Download Paper |

Abstract

The demand for high speed and secure wireless local area network (WLAN) continues to grow exponentially. As a result, the Wi-Fi technology continues to evolve to meet the needs of both the enterprise and home network environments. Wireless security has been a special area of interest to users, vendors and researchers. One of the most important and recent advancement is the introduction of WPA3 personal and enterprise to address some of the serious vulnerability issues of WPA2/WPA. Ensuring that wireless security curriculum up to date has been a challenge due to the reluctance of the Access Point (AP) and Wireless Station/Client STA) vendors to implement WPA3 in their currently affordable products. Also, it has been a challenge to be able to access information from the vendors products to develop and deliver practical and robust lab exercises on the cryptographic algorithms specified in the WPA3 personal and enterprise standard.

In this paper, we present our solution to address these challenges where we adopted the approach of creating our own affordable, customizable and flexible wireless access point and wireless stations/clients. These customizable wireless components are created using open source software running on the affordable Raspberry Pi 3B units. The RPi-3B units must be equipped with USB wireless adaptors with wireless chips that support WPA3 protocols and requirements. The open source software packages adopted in our solution are the Linux wpa supplicant (wireless station/supplicant), hostapd (access point/authenticatior) and freeradius (authentication server) latest releases.

In this paper, we present the results of using this customizable, upgradable, and affordable solution. We also share how we were able to develop and deliver a well thought-out, thoroughly tested and well-received by the students lab exercises on the latest wireless security algorithms (such as SAE/Dragonfly based on NIST elliptical curve cryptography). In these lab exercises, the students are provided with python script implementation of some of the algorithm and asked to create their own for others. We also provide the students with a validation methodology that we developed that enable them to extract the input ingredients required by and the target output expected from the security algorithm scripts.

Salib, E. H. (2023, June), WPA3 Personal and Enterprise Wireless Security Algorithm Labs for Undergraduate Level Paper presented at 2023 ASEE Annual Conference & Exposition, Baltimore , Maryland. 10.18260/1-2--44438

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2023 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015