Academic literature on the topic 'WPA/WPA2'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WPA/WPA2.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "WPA/WPA2"
Chen, Chin-Ling, and Supaporn Punya. "An enhanced WPA2/PSK for preventing authentication cracking." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (August 1, 2021): 85. http://dx.doi.org/10.11591/ijict.v10i2.pp85-92.
Full textZhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.
Full textJohnson, Tyler, Daniel Roggow, Phillip H. Jones, and Joseph Zambreno. "An FPGA Architecture for the Recovery of WPA/WPA2 Keys." Journal of Circuits, Systems and Computers 24, no. 07 (June 17, 2015): 1550105. http://dx.doi.org/10.1142/s0218126615501054.
Full textKalam, M. Zatiar Erwan, Ni Made Ary Esta Dewi Wirastuti, and I. Made Oka Widyantara. "Analisa Kinerja Penerapan Standard Protokol Keamanan IEEE 802.11 Pada Layanan Wireless Fidelity." Majalah Ilmiah Teknologi Elektro 20, no. 1 (March 1, 2021): 89. http://dx.doi.org/10.24843/mite.2021.v20i01.p10.
Full textJiang, Zi Gui. "Study of Wi-Fi Security Basing on Wireless Security Standards (WEP, WPA and WPA2)." Advanced Materials Research 1049-1050 (October 2014): 1993–96. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1993.
Full textJude Saskara, Gede Arna, I. Putu Oktap Indrawan, and Putu Maha Putra. "KEAMANAN JARINGAN KOMPUTER NIRKABEL DENGAN CAPTIVE PORTAL DAN WPA/WPA2 DI POLITEKNIK GANESHA GURU." Jurnal Pendidikan Teknologi dan Kejuruan 16, no. 2 (July 31, 2019): 236. http://dx.doi.org/10.23887/jptk-undiksha.v16i2.18559.
Full textBanakh, R. I. "AUTHENTICATION METHOD WPA/WPA2 KEY PARAMETERS’ DEFINITION FOR IEEE 802.11 BASED HONEYPOT." Radio Electronics, Computer Science, Control, no. 1 (May 29, 2018): 110–18. http://dx.doi.org/10.15588/1607-3274-2018-1-13.
Full textSu, Di Xin, Zhi Xue, and Yong Shi. "Analysis of Wireless Network Security Based on 4-Way Handshake Protocol." Advanced Materials Research 1006-1007 (August 2014): 924–29. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.924.
Full textPETRICĂ, Gabriel. "A Study on Password Strength in Wireless Encryption Protocols." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 21–26. http://dx.doi.org/10.19107/ijisc.2019.02.02.
Full textYong-lei, Liu, and Jin Zhi-gang. "Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture." International Journal of Communication Systems 28, no. 4 (November 25, 2013): 723–42. http://dx.doi.org/10.1002/dac.2699.
Full textDissertations / Theses on the topic "WPA/WPA2"
Eklund, Berggren Oscar. "Penetrationstest av WLAN : med brute force av WEP, WPA, WPA2 och WPS." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79541.
Full textAkinola, Azeez Paul, and Chong Zhang. "Evaluate Security on the Internet Cafe." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21553.
Full textVojtíšek, Jindřich. "Analýza šifrovacích algoritmů ve standardu 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220648.
Full textEriksson, Per, William Wiklund, and Elie El-Hajj. "Analys och utvärdering av trådlösa nätverk i Kalmar : En säkerhetsundersökning." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5935.
Full textSyftet med arbetet är att ta reda på hur väl privatpersoner informeras om hur de ska skydda sina trådlösa nätverk och varför. Genom arbetet ska följande frågor besvaras:
- Vid beställning av bredband inklusive trådlös router från en bredbandsleverantör: informerar leverantören sina kunder om att det trådlösa nätverket bör säkras upp och varför?
- Blir man informerad om säkerheten när man köper en trådlös router i en lokal affär?
- Skyddar invånare i Kalmar generellt sett sina trådlösa nätverk?
Genom användning av kvantitativa metoder i form av observationer har vi svarat på två av frågeställningarna. En kvalitativ metod användes genom att vi skickade enkäter via e-post till fem bredbandsleverantörer.
Resultaten från vår undersökning visar att majoriteten av invånarna i Kalmar skyddar sina nätverk, men att det är vanligast med en svag kryptering. Undersökningen visar att informationen från lokala affärer och bredbandsleverantörer är bristfällig.
Škodák, Jaroslav. "Zabezpečení bezdrátových sítí IEEE 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217503.
Full textFalk, Magnus. "Snabb och säker roaming i WLAN." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2695.
Full textThis thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market.
The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE.
Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i.
The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity.
This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.
Marušek, Michal. "Zefektivnění zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218098.
Full textEndrle, Pavel. "Zabezpečení standardu 802.11 a jeho možnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.
Full textde, Laval johnny. "Trådlösa Nätverk : säkerhet och GPU." Thesis, Högskolan på Gotland, Institutionen för speldesign, teknik och lärande, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-1063.
Full textWireless networks are inherently vulnerable for eavesdropping since they use radio waves to communicate. Wireless networks are therefore protected by encryption. WEP was the first encryption standard that was widely used. Unfortunately WEP proved to have several serious vulnerabilities. WEP could be circumvented within few minutes. Therefore WPA was developed as a response to the weak WEP. Shortly thereafter WPA2 was released and are now being used in present. The only weakness with WPA2 is in the subset WPA2-PSK when weak passwords are being used. Software could easily go through large dictionaries to verify if a password could be recovered. But that is time consuming and therefore providing wireless networks limited protection. However a new area of use with advanced graphic cards has showed that it is providing a faster way of recovering passwords than the ordinary processor on the motherboard. That opens up for the larger use of dictionaries and the processing of words or combinations of words. That is what this study aims to shed light on. How the efficiency of the graphic cards have affected security in wireless networks from a corporate perspective of view.
Klepáčková, Karolína. "Aplikace pro Android na bezpečnostní monitorování komunikace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399203.
Full textBook chapters on the topic "WPA/WPA2"
Khasawneh, Mahmoud, Izadeen Kajman, Rashed Alkhudaidy, and Anwar Althubyani. "A Survey on Wi-Fi Protocols: WPA and WPA2." In Communications in Computer and Information Science, 496–511. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54525-2_44.
Full textAtluri, Sidharth, and Revanth Rallabandi. "Deciphering WEP, WPA, and WPA2 Pre-shared Keys Using Fluxion." In Smart Computing Techniques and Applications, 377–85. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0878-0_37.
Full textChang, TienHo, Chiamei Chen, Hanwei Hsiao, and GuHsin Lai. "The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs." In Communications in Computer and Information Science, 118–27. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7850-7_11.
Full textDuc, Hung Bui, Stefan Pocarovsky, Milos Orgon, and Martin Koppl. "Penetration Testing of WiFi Networks Secured by WEP and WPA/WPA2 Protocols." In Informatics and Cybernetics in Intelligent Systems, 571–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77448-6_56.
Full textGe, Liang, Lianhai Wang, Lijuan Xu, and Shumian Yang. "Password Recovery for WPA/WPA2-PSK Based on Parallel Random Search with GPU." In Wireless Communications, Networking and Applications, 1149–59. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2580-5_105.
Full textConference papers on the topic "WPA/WPA2"
Liu, Yonglei. "Defense of WPA/WPA2-PSK Brute Forcer." In 2015 2nd International Conference on Information Science and Control Engineering (ICISCE). IEEE, 2015. http://dx.doi.org/10.1109/icisce.2015.48.
Full textAbdelrahman, A., H. Khaled, Eman Shaaban, and Wail S. Elkilani. "WPA-WPA2 PSK Cracking Implementation on Parallel Platforms." In 2018 13th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2018. http://dx.doi.org/10.1109/icces.2018.8639328.
Full textAdnan, Abdillahi Hassan, Mohamed Abdirazak, A. B. M. Shamsuzzaman Sadi, Towfique Anam, Sazid Zaman Khan, Mohammed Mahmudur Rahman, and Mohamed Musse Omar. "A comparative study of WLAN security protocols: WPA, WPA2." In 2015 International Conference on Advances in Electrical Engineering (ICAEE). IEEE, 2015. http://dx.doi.org/10.1109/icaee.2015.7506822.
Full textLiu, Yonglei, Zhigang Jin, and Ying Wang. "Survey on Security Scheme and Attacking Methods of WPA/WPA2." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601275.
Full textArash Habibi Lashkari, Mir Mohammad Seyed Danesh, and Behrang Samadi. "A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234856.
Full textNoh, Jaewon, Jeehyeong Kim, Giwon Kwon, and Sunghyun Cho. "Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography." In 2016 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia). IEEE, 2016. http://dx.doi.org/10.1109/icce-asia.2016.7804782.
Full textChang, Tien-Ho, Jiunn-Wu Lin, Chia-Mei Chen, and Gu-Hsin Lai. "The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual?" In 2018 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 2018. http://dx.doi.org/10.1109/desec.2018.8625156.
Full textChen, Chia-Mei, and Tien-Ho Chang. "The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient Method." In 2015 10th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2015. http://dx.doi.org/10.1109/asiajcis.2015.14.
Full text