全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Wi-Fi: WPA2 Security Vulnerability and Solutions

DOI: 10.4236/wet.2021.122002, PP. 15-22

Keywords: Wi-Fi, WPA2, SHA-512, IoT

Full-Text   Cite this paper   Add to My Lib

Abstract:

The Internet of Things (IoT) is an emerging network infrastructure with more than five devices owned by a single user. Wireless connectivity forms the backbone of such infrastructure. IoT uses diverse wireless communication technologies such as IEEE 802.15.4, Wi-Fi, Zigbee, Bluetooth, RFID, BLE (Bluetooth Low Energy), and various other cellular technologies. Wi-Fi is most suitable for IoT Home or office networks. Practically wireless signals do not adhere to the boundaries of the office or home, or organization and impose inherent security risks like information leakage, unauthorized access, other security and privacy threats to networking infrastructure. Therefore Authorization/Association of devices is one of the main security concerns. This paper discusses how unauthorized access to wireless networks (Wi-Fi) can be secured by improving existing WPA2 protocol security.

References

[1]  Aqeel-ur-Rehman, K.M. and Ahmed, B. (2013) Communication Technology That Suits IoT—A Critical Review. CCIS Springer-Verilag, Heidelberg.
[2]  Taskin, M. (2008) WEP Post Processing Algorithm for Robust 802.11 WLAN Implementation. Science Direct: Computer Communication Journal, 31, 3405-3409.
[3]  Sheila, F. (2007) Establsihing Wireless Robust Security Networks. NIST Special Publication, Gaithersburg.
[4]  The Wi-Fi Alliance (2012) The State of Wi-Fi ®Security.
https://davidhoglund.typepad.com/files/20120229_state_of_wi-fi_security_09may2012_updated_cert.pdf
[5]  John, L.M. (2005) Auditing Wi-Fi Protected Access (WPA) Pre Shared Key Mode. Linux Journal3. https://www.linuxjournal.com/article/8312
[6]  Arash, H.L., Mir, M.S.D. (2009) A Survey on Wireless Security Protocols (WEP, WPA and WPA2/802.11i). 2009 2nd IEEE International Conference on Computer Science and Information Technology, Beijing, 8-11 August 2009.
https://doi.org/10.1109/ICCSIT.2009.5234856
[7]  Mannon M., Najar, Z.A. and Abdul Jawad, M. (2017) An Approach to Secure 802.11 Authentication Process Using One Time Pad Concept. International Journal of Recent Scientific Research, 8, 20270-20272.
[8]  Mina, M., Abdul, A., Zunata, A. and Zaton, M. (2007) Security Improvement for Management Frames in IEEE 802.11 Wireless Networks. International Journal of Computer Science and Network Security, 7, 276-284.
[9]  Chibiao, L. and Jame, Y. (2007) A Solution for WLAN Authentication and Association Attacks. International Journal of Computer Science.
[10]  Bicakci, K. and Tavli, B. (2009) Denial of Service Attacks and Countermeasures in IEEE 802.11 Wireless Networks. Computer Standards and Interfaces, 31, 931-941.
[11]  Zhang, Y. and Sampalli, S. (2010) Client-based Intrusion Prevention System for 802.11 Wireless LANs, WiMob2010. Proceedings of the 6th International Conference IEEE 2010 on Wireless and Mobile Computing, Networking and Communication, Niagara Falls, 11-13 October 2010, 100-107.
https://doi.org/10.1109/WIMOB.2010.5644978
[12]  Odhiambo, O.N, Biermann, E. and Noel, G. (2009) An Integrated Security Model for WLAN. AFRICON 2009, Nairobi, 23-25 September 2009, 1-6.
https://doi.org/10.1109/AFRCON.2009.5308183
[13]  Achilleas, T., Dimitris, L. and Emmanuel, T. (2014) Exposing WPA2 Security Protocol Vulnerabilities. International Journal of Information and Computer Society, 6, 93-107.
https://doi.org/10.1504/IJICS.2014.059797

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133