8257 interfacing 2 in microprocessor for btech students
ZatinshchikovSV_M112201_Dragonblood_v2.pptx
1. Dragonblood:Analyzing the
Dragonfly Handshake ofWPA3 and
EAP-pwd
Author: Zatinschikov S.V., 1st year Master’s degree in Information
and communication technologies and communication systems
student, Faculty of Radio andTelevision, Educational program in
Security and software protection of infocommunications, MTUCI.
Advisor: DzhabrailovaV.S., PhD, Associate professor at the
department of Philosophy, History and Cross-cultural
Communication, MTUCI
Ministry for Digital Development, Communications and Mass
Media of the Russian Federation
Federal State Budgetary Educational Institution of
Higher Professional Education
Moscow Technical University of Communications and
Informatics
2. THE IMRAD STRUCTURE
Introduction
Methods
Results
Discussion/Conclusion
The main structure used when writing a scientific article is
IMRAD. It usually consists of the following items:
• Introduction –Why was the study undertaken?What was
the research question, the tested hypothesis or the
purpose of the research?
• Methods –When, where, and how was the study done?
What materials were used or who was included in the
study groups (patients, etc.)?
• Results –What answer was found to the research
question; what did the study find?Was the tested
hypothesis true?
• Discussion –What might the answer imply and why does
it matter? How does it fit in with what other researchers
have found?What are the perspectives for future
research?
3. TITLE
•Title of the article being studied –
«Dragonblood: Analyzing the
Dragonfly Handshake ofWPA3 and
EAP-pwd»
•It uses terms such asWPA3(WiFi
ProtectedAccess) and EAP-pwd
(ExtensibleAuthentication Protocol -
Password), that are often used in the
field of information security,
networking and network security
4. ABSTRACT
•Abstract section in this paper
describes the importance and
relevance of this article. It
contains brief statements about
the work done in this article.The
importance of the article is
shown in the prevalence of the
use of theWPA3 and EAP-pwd
protocols, as well as in the cost
of reproducing some
vulnerabilities.
5. INTRODUCTION
• As for the first part of IMRAD structure, this part contains a more
detailed description of the sections discussed in the work and authors
hypothesis about WPA3 security. Also, the contribution of the authors to
the finalization of the 802.11ax standard is presented at the end. It can
be useful to determine if the paper is useful for your work or not.
6. INTRODUCTION(BACKGROUND)
• As a part of Introduction,
Background shows us the
theoretical part of the
paper, including algorithms
that were used inWPA3
Dragonfly Handshake.This
part may be interested to
those people who want to
thoroughly understand how
the protocolsWPA3 and
EAP-pwd work. Also, the
comparison withWPA2 is
presented.
7. METHODS
•In this section authors describe their methodology, and
evaluate the security of EAP-pwd andWPA3-SAE
implementations.
8. METHODS(ATTACKS)
The structure of the main part differs from that of the IMRAD,
as it presents not only the methods used to carry out each
attack, but also the results for each section. It can be useful for
people that are looking for information for certain attack type.
9. RELATEDWORK
• This part(which is not
included in the standard
IMRAD structure) describes
other works, related with
that paper, what helped the
author to conduct research.
It will be useful for those
people who want to find
additional information on
the topic of the article
without looking through the
list of references.
10. CONCLUSION AND RECOMMENDATIONS
•Combining the results and
discussion parts, this part, describes
the authors thoughts about the
work done, as well as summarize
the results of the safety assessment
of the studied standards. Here you
can find a link to a list of
improvements that are supposed to
be used when updating the
standards
11. ACKNOWLEDGMENTS
This part shows us people and organizations that helped
authors to write their paper. You may use this information to
find out about help that you can get for your researches. This
part is not used in the standard IMRAD structure.
12. REFERENCES
For those people who
want to delve into the
essence of the article, a
table of contents is
presented. Sources are
listed in alphabetical
order of surnames, in
APA format
13. APPENDIX
This part contains
information in greater
detail than
can be presented in the
methods part(for
example, experiment
graphs and source
code), but
which may be of
interest to a few people
working
specifically in the field
of wireless network
security.
14. Dragonblood:Analyzing the
Dragonfly Handshake ofWPA3 and
EAP-pwd
Author: Zatinschikov S.V., 1st year Master’s degree in Information
and communication technologies and communication systems
student, Faculty of Radio andTelevision, Educational program in
Security and software protection of infocommunications, MTUCI.
Advisor: DzhabrailovaV.S., PhD, Associate professor at the
department of Philosophy, History and Cross-cultural
Communication, MTUCI
Ministry for Digital Development, Communications and Mass
Media of the Russian Federation
Federal State Budgetary Educational Institution of
Higher Professional Education
Moscow Technical University of Communications and
Informatics