Academic literature on the topic 'WPA/WPA2'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WPA/WPA2.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WPA/WPA2"

1

Chen, Chin-Ling, and Supaporn Punya. "An enhanced WPA2/PSK for preventing authentication cracking." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (August 1, 2021): 85. http://dx.doi.org/10.11591/ijict.v10i2.pp85-92.

Full text
Abstract:
Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the users in wireless networks. We have discussed the weakness of 4-way handshake procedure in Wi-Fi WPA2/PSK and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking and the result is also given.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.

Full text
Abstract:
Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.
APA, Harvard, Vancouver, ISO, and other styles
3

Johnson, Tyler, Daniel Roggow, Phillip H. Jones, and Joseph Zambreno. "An FPGA Architecture for the Recovery of WPA/WPA2 Keys." Journal of Circuits, Systems and Computers 24, no. 07 (June 17, 2015): 1550105. http://dx.doi.org/10.1142/s0218126615501054.

Full text
Abstract:
Wi-Fi protected access (WPA) has provided serious improvements over the now deprecated wired equivalent privacy (WEP) protocol. WPA, however, still has some flaws that allow an attacker to obtain the passphrase. One of these flaws is exposed when the access point (AP) is operating in the WPA personal mode. This is the most common mode, as it is the quickest and easiest to configure. This vulnerability requires the attacker to capture the traffic from the four-way handshake between the AP and client, and then have enough compute time to reverse the passphrase. Increasing the rate at which passphrases can be reversed reduces the amount of time required to construct a repository of service set identifiers (SSIDs) and passphrases, which can increase the chances an attack is successful, or, alternatively, reduce the difficulty of auditing a wireless network for security purposes. This work focuses on creating an field programmable gate array (FPGA)-based architecture to accelerate the generation of a WPA/WPA2 pairwise master key (PMK) lookup table (LUT) for the recovery of the passphrase, with special emphasis on the secure hash algorithm-1 (SHA-1) implementation. PMK generation relies heavily on SHA-1 hashing and, as this work shows, an optimized SHA-1 implementation can achieve up to a 40 × speedup over an unoptimized implementation when generating PMKs.
APA, Harvard, Vancouver, ISO, and other styles
4

Kalam, M. Zatiar Erwan, Ni Made Ary Esta Dewi Wirastuti, and I. Made Oka Widyantara. "Analisa Kinerja Penerapan Standard Protokol Keamanan IEEE 802.11 Pada Layanan Wireless Fidelity." Majalah Ilmiah Teknologi Elektro 20, no. 1 (March 1, 2021): 89. http://dx.doi.org/10.24843/mite.2021.v20i01.p10.

Full text
Abstract:
Jaringan komunikasi semakin bergantung pada WLAN, maka semakin tinggi tuntutan Quality of Service (QoS) WLAN seperti Throughput, delay, dan jitter Untuk menjaga keamanan media komunikasi data, maka digunakan mekanisme keamanan jaringan Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA), dan WPA2 [14]. Mall Bali Galeria memiliki beberapa alternatif Free WiFi. Banyaknya Wi-Fi yang terpasang menimbulkan permasalahan interferensi yang mempengaruhi unjuk kerja jaringan WiFi, MBG sendiri memiliki area Indoor dan Outdoor, Alternatif untuk mengatasi interferensi adalah dengan melakukan automasi penkanalan dengan menerapkan Channel Fly, Background Scanning dan Static Channel. Dari mekanisme keamanan, Penkanalan dan frekuensi dibuat skenario dilakukan penelitian pada setiap askes point untuk mendapatkan skenario terbaik, dari skenario yang diajukan, nilai Paket loss terbaik lingkungan indoor AP 4 dengan skenario frekuensi 5Ghz, Statik Channel, WEP-64 paket loss 0,016 ms, lingkungan outdoor AP 5 Frekuensi 5Ghz, Channel Fly, WEP-64 paket loss 0.094 ms, nilai Jitter terbaik lingkungan indoor AP 2 5Ghz Background Scanning, WPA 2, Jitter 1.336 ms, lingkungan outdoor AP 8 5Ghz, Statik Channel, WPA2-Mixed Jitter 1,116 ms, nilai Throughput terbaik lingkungan indoor AP 1 5Ghz, Statik channel, WPA2-Mixed, Throughput 78,7Mbps, untuk Outdoor AP 8 5Ghz, Background Scanning, Disable Security, Throughput 80Mbps jika dibandingkan dengan skenario eksisting performa unjuk kerja meningkat sebesar 10-30%. WEP memiliki nilai packet loss baik tetapi memiliki nilai Throughput yang lebih kecil. Static channel disarankan pada lokasi yang memiliki interferensi tinggi.
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang, Zi Gui. "Study of Wi-Fi Security Basing on Wireless Security Standards (WEP, WPA and WPA2)." Advanced Materials Research 1049-1050 (October 2014): 1993–96. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1993.

Full text
Abstract:
Wi-Fi becomes increasingly popular for people who use smart phones, tablet computers and laptops frequently. It is essentially for users to understand the security problems of Wi-Fi in order to prevent information leakage. The key wireless security standards used in IEEE 802.11 are WEP, WPA and WPA2. The main purpose of this paper is to investigate the security vulnerabilities of these three standards and attempt to conclude an optimal solution for common users.
APA, Harvard, Vancouver, ISO, and other styles
6

Jude Saskara, Gede Arna, I. Putu Oktap Indrawan, and Putu Maha Putra. "KEAMANAN JARINGAN KOMPUTER NIRKABEL DENGAN CAPTIVE PORTAL DAN WPA/WPA2 DI POLITEKNIK GANESHA GURU." Jurnal Pendidikan Teknologi dan Kejuruan 16, no. 2 (July 31, 2019): 236. http://dx.doi.org/10.23887/jptk-undiksha.v16i2.18559.

Full text
Abstract:
Pada Revolusi Industri 4.0 saat ini perkembangan jaringan komputer sudah semakin pesat. Dilihat dari media penghubung antara komputer satu dengan komputer satunya yang sebelumnya masih menggunakan kabel, sekarang ini sudah berubah menjadi tanpa menggunakan perantara kabel atau istilahnya nirkabel atau wireless. Salah satu instansi swasta yaitu Politeknik Ganesha Guru banyak memanfaatkan teknologi jaringan komputer yang bersifat nirkabel atau wireless. Penggunaan jaringan komputer nirkabel diinstansi dibangun untuk mendukung kegiatan administrasi hingga kegiatan perkuliahan di Politeknik Ganesha Guru. Perkembangan jaringan tersebut berjalan lurus dengan keamanan jaringan. Pada jaringan nirkabel banyak user dapat terhubung ke dalam jaringan sehingga dibutuhkan lapisan keamanan agar sistem maupun server yang terdapat di instansi aman. Untuk mengamankan jaringan nirkabel terdapat beberapa teknologi yang dapat digunakan untuk mengamankan jaringan beberapa diantaranya adalah menambahkan Captive Portal, RADIUS hingga Authentication dengan kriptografi seperti WPA dan WPA2. Kemanan jaringan di Politeknik Ganesha Guru sudah menerapkan lapisan keamanan Captive Portal, RADIUS dan juga Authentication dengan WPA. Untuk menguji kemanan jaringan di instansi menggunakan pengujian dengan Vulnerability Assessment dan juga Penetration Test. Dari hasil pengujian didapatkan jaringan nirkabel di Politeknik Ganesha Guru yang hanya menggunakan Captive Portal dan RADIUS, user masih dapat melakukan penyerangan terhadap jaringan, sedangkan setelah ditambahkan authentication dengan WPA, user tidak dapat melakukan serangan.
APA, Harvard, Vancouver, ISO, and other styles
7

Banakh, R. I. "AUTHENTICATION METHOD WPA/WPA2 KEY PARAMETERS’ DEFINITION FOR IEEE 802.11 BASED HONEYPOT." Radio Electronics, Computer Science, Control, no. 1 (May 29, 2018): 110–18. http://dx.doi.org/10.15588/1607-3274-2018-1-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Su, Di Xin, Zhi Xue, and Yong Shi. "Analysis of Wireless Network Security Based on 4-Way Handshake Protocol." Advanced Materials Research 1006-1007 (August 2014): 924–29. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.924.

Full text
Abstract:
With the growing popularity of network, more and more people use embedded portable devices to carry out e-commerce by wireless network. However, the security of wireless network is increasingly grim. According to the WPA/WPA2, this paper focuses on authentication issues between access point AP and wireless client STA in the wireless network security, and presents an improved protocol to resolve these problems. The improved one based on 4-way handshake protocol can resist dictionary attack, DOS attack and phishing attack. In the End, the paper analyzes the protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

PETRICĂ, Gabriel. "A Study on Password Strength in Wireless Encryption Protocols." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 21–26. http://dx.doi.org/10.19107/ijisc.2019.02.02.

Full text
Abstract:
Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.
APA, Harvard, Vancouver, ISO, and other styles
10

Yong-lei, Liu, and Jin Zhi-gang. "Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture." International Journal of Communication Systems 28, no. 4 (November 25, 2013): 723–42. http://dx.doi.org/10.1002/dac.2699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "WPA/WPA2"

1

Eklund, Berggren Oscar. "Penetrationstest av WLAN : med brute force av WEP, WPA, WPA2 och WPS." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79541.

Full text
Abstract:
I en tid då datorer, mobiler och andra enheter som kan ansluta till ett WLAN är stor, kommer säkerheten i dessa WLAN spela en stor roll. Det som skiljer WLAN och LAN när det kommer till säkerheten är att informationen måste färdas trådlöst i luften, vilket kan medföra att obehöriga kan lyssna av eller försöka koppla upp sig mot det trådlösa nätverket. Valet och implementationen av kryptering av WLAN för SME och privatpersoner har en stor inverkan på säkerheten i ens WLAN. Hur enkelt är det för en obehörig person att ta sig in på ett WLAN? Denna undersökning testar WLAN som använder WEP, WPA/WPA2 PSK och WPS med hjälp av en brute force attack för att avgöra om krypteringprotokollen är lämpliga att använda sig av. Testet simuleras med en obehörig laptop som försöker ta sig in in WLAN med brute force på WLAN som använder WEP, WPA/WPA2 PSK och WPS. Program som aircrack-ng och airgeddon används för att utföra testerna.
APA, Harvard, Vancouver, ISO, and other styles
2

Akinola, Azeez Paul, and Chong Zhang. "Evaluate Security on the Internet Cafe." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21553.

Full text
Abstract:
Internet security (Network security) is a big topic that is very important in our society communication system, but it is extremely dynamic and wide in scope. This is the reason that many companies and organizations invest heavily in a dedicated infrastructure security and highly trained specialists.The aim of security monitoring and preventing the network from cyber threats requires vigilance over the network equipment. The case study of this thesis is to provide the possible solution to the problems encountered by the namely network users such as: Internet Game Center (Centrum Halmstad, Sweden) and, the Blueville Internet Cafe (Ede, Nigeria).Our research and information collected over the telephone and a visit at the nearest office. We concluded that both companies mentioned above experienced similar cyber threats. The two companies have internal and external threats such as accessing the network via ssh by using it brute force attack, network war-driver, the installation of spyware, password sniffer, viruses, SQL injection and PHP attacks (web attacks) on the networks. The cyber threats virus and spyware are among the big internet threat to users, organization and companies.We carry out experiments in the lab to tests for threats such as brute force (ssh) attack, password sniffer and war-driver in the Wireless environment. From the results, we are able to the select WPA2 using 802.1x as the best possible way to limit and reduce the strength of cyber-attacks, and as a suggested solution to the namely café problems in our report. We also list different suggestion and solution to the cyber café attacks from our research papers and information gathers from different sources such as library, internet, seminar and textbooks.
APA, Harvard, Vancouver, ISO, and other styles
3

Vojtíšek, Jindřich. "Analýza šifrovacích algoritmů ve standardu 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220648.

Full text
Abstract:
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Eriksson, Per, William Wiklund, and Elie El-Hajj. "Analys och utvärdering av trådlösa nätverk i Kalmar : En säkerhetsundersökning." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5935.

Full text
Abstract:

Syftet med arbetet är att ta reda på hur väl privatpersoner informeras om hur de ska skydda sina trådlösa nätverk och varför. Genom arbetet ska följande frågor besvaras:

- Vid beställning av bredband inklusive trådlös router från en bredbandsleverantör: informerar leverantören sina kunder om att det trådlösa nätverket bör säkras upp och varför?

- Blir man informerad om säkerheten när man köper en trådlös router i en lokal affär?

- Skyddar invånare i Kalmar generellt sett sina trådlösa nätverk?

Genom användning av kvantitativa metoder i form av observationer har vi svarat på två av frågeställningarna. En kvalitativ metod användes genom att vi skickade enkäter via e-post till fem bredbandsleverantörer.

Resultaten från vår undersökning visar att majoriteten av invånarna i Kalmar skyddar sina nätverk, men att det är vanligast med en svag kryptering. Undersökningen visar att informationen från lokala affärer och bredbandsleverantörer är bristfällig.

APA, Harvard, Vancouver, ISO, and other styles
5

Škodák, Jaroslav. "Zabezpečení bezdrátových sítí IEEE 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217503.

Full text
Abstract:
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.
APA, Harvard, Vancouver, ISO, and other styles
6

Falk, Magnus. "Snabb och säker roaming i WLAN." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2695.

Full text
Abstract:

This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market.

The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE.

Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i.

The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity.

This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.

APA, Harvard, Vancouver, ISO, and other styles
7

Marušek, Michal. "Zefektivnění zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218098.

Full text
Abstract:
Nowadays every wireless radio-communication services encompass huge type of technology used for transfer video, voice or data. Wireless communication is the most expanded branch and many companies are using this technology because of low cost and simply management. The biggest advantage is easy connection to shared wireless medium and allows users of network to move around whole covered area. The most expanded types of wireless networks are called Wireless LAN (WLAN). With rising number of WLANs is rising chance to attack shared wireless medium by hacker and many sensitive information can be stolen or modified. To avoid this chance was created the first security protocol used in WLAN called WEP. Its goal was protect data transmitted trough WLAN as strong as were protected in wired networks. Unfortunately WEP was hiding a big weakness which can be used in a crack of WLAN in a minute with the aid of special software. Example of this kid of software can be Airsnort constructed to monitor shared medium and captured every packet transferred trough this medium. Based on statistical method Airsnort can obtain hidden password in a few minutes. The second type of this software can be Aircrack-ng, which can crack hidden password without any user connected to WLAN. Aircrack-ng uses active techniques to generate network load and can obtain password more effectively and faster. The result of both cases was successful and protection of WLAN was completely cracked. Later was created new security protocol called WPA, which had to fix the cryptography weakness of previous WEP. WPA was only temporary security protocol, during standard 802.11 was developing which had to offer highest security and integrity protection of transferred data trough WLAN. For this reasons was created new version of WPA called WPA2 which satisfy requirements of standard 802.11i. Both protocols WPA/WPA2 contain weakness, which can crash security of WLAN. This crack is based on authentication PSK. Attacker during authentication is using information from four-way handshake between user of WLAN and access point. Based on this information attacker can crack password with the aid of password list attack which took approximately 30 minutes. Based on previous result is important to chose strong password contains alphanumeric string or special strings with satisfy length.
APA, Harvard, Vancouver, ISO, and other styles
8

Endrle, Pavel. "Zabezpečení standardu 802.11 a jeho možnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.

Full text
Abstract:
This master´s thesis is about 802.11 standard security techniques and their features. Particular types of this standard and its features are shown in the introduction. Wireless network security cypher alghoritm types, their features, weaknesses and principles of functions are closely described in next few chapters. Realized attacks on these security alghoritms with their principles are described and shown in the practical part of thesis. One chapter is about effectivity, accessibility and practicability valorization of these attacks in practice.
APA, Harvard, Vancouver, ISO, and other styles
9

de, Laval johnny. "Trådlösa Nätverk : säkerhet och GPU." Thesis, Högskolan på Gotland, Institutionen för speldesign, teknik och lärande, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-1063.

Full text
Abstract:
Trådlosa nätverk är av naturen sårbara for avlyssning för att kommunikationen sker med radiovagor. Därfor skyddas trådlosa nätverk med kryptering. WEP var den första krypteringsstandarden som användes av en bredare publik som senare visade sig innehålla flera sårbarheter. Följden blev att krypteringen kunde förbigås på ett par minuter. Därför utvecklades WPA som ett svar till sårbarheterna i WEP. Kort därefter kom WPA2 som är den standard som används i nutid. Den svaghet som kan påvisas med WPA2 finns hos WPA2-PSK när svaga lösenord används. Mjukvaror kan med enkelhet gå igenom stora uppslagsverk för att testa om lösenord går att återställa. Det är en process som tar tid och som därför skyddar nätverken i viss mån. Dock har grafikprocessorer börjat användas i syfte för att återställa lösenord. Grafikkorten är effektivare och återställer svaga lösenord betydligt snabbare än moderkortens processorer. Det öppnar upp for att jämföra lösenord med ännu större uppslagsverk och fler kombinationer. Det är vad denna studie avser att belysa; hur har grafikkortens effektivitet påverkat säkerheten i trådlösa nätverk ur ett verksamhetsperspektiv.
Wireless networks are inherently vulnerable for eavesdropping since they use radio waves to communicate. Wireless networks are therefore protected by encryption. WEP was the first encryption standard that was widely used. Unfortunately WEP proved to have several serious vulnerabilities. WEP could be circumvented within few minutes. Therefore WPA was developed as a response to the weak WEP. Shortly thereafter WPA2 was released and are now being used in present. The only weakness with WPA2 is in the subset WPA2-PSK when weak passwords are being used. Software could easily go through large dictionaries to verify if a password could be recovered. But that is time consuming and therefore providing wireless networks limited protection. However a new area of use with advanced graphic cards has showed that it is providing a faster way of recovering passwords than the ordinary processor on the motherboard. That opens up for the larger use of dictionaries and the processing of words or combinations of words. That is what this study aims to shed light on. How the efficiency of the graphic cards have affected security in wireless networks from a corporate perspective of view.
APA, Harvard, Vancouver, ISO, and other styles
10

Klepáčková, Karolína. "Aplikace pro Android na bezpečnostní monitorování komunikace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399203.

Full text
Abstract:
This diploma thesis is focused on implementation of application for security monitoring of network communication of other applications in mobile device with Android platform. Provides users information about security risks that may harm his/her privacy or device. It uses a local VPN to tunnel all data sent to the wireless network. These can be linked to an application that has sent them because the Android kernel is derived from the Linux kernel and can be used to retrieve information about established network connections and the application identifier associated with the connection. This mapping allows to get more information about an app that is potentially dangerous for your mobile device.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "WPA/WPA2"

1

Khasawneh, Mahmoud, Izadeen Kajman, Rashed Alkhudaidy, and Anwar Althubyani. "A Survey on Wi-Fi Protocols: WPA and WPA2." In Communications in Computer and Information Science, 496–511. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54525-2_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Atluri, Sidharth, and Revanth Rallabandi. "Deciphering WEP, WPA, and WPA2 Pre-shared Keys Using Fluxion." In Smart Computing Techniques and Applications, 377–85. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0878-0_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, TienHo, Chiamei Chen, Hanwei Hsiao, and GuHsin Lai. "The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs." In Communications in Computer and Information Science, 118–27. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7850-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Duc, Hung Bui, Stefan Pocarovsky, Milos Orgon, and Martin Koppl. "Penetration Testing of WiFi Networks Secured by WEP and WPA/WPA2 Protocols." In Informatics and Cybernetics in Intelligent Systems, 571–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77448-6_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ge, Liang, Lianhai Wang, Lijuan Xu, and Shumian Yang. "Password Recovery for WPA/WPA2-PSK Based on Parallel Random Search with GPU." In Wireless Communications, Networking and Applications, 1149–59. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2580-5_105.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "WPA/WPA2"

1

Liu, Yonglei. "Defense of WPA/WPA2-PSK Brute Forcer." In 2015 2nd International Conference on Information Science and Control Engineering (ICISCE). IEEE, 2015. http://dx.doi.org/10.1109/icisce.2015.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abdelrahman, A., H. Khaled, Eman Shaaban, and Wail S. Elkilani. "WPA-WPA2 PSK Cracking Implementation on Parallel Platforms." In 2018 13th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2018. http://dx.doi.org/10.1109/icces.2018.8639328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adnan, Abdillahi Hassan, Mohamed Abdirazak, A. B. M. Shamsuzzaman Sadi, Towfique Anam, Sazid Zaman Khan, Mohammed Mahmudur Rahman, and Mohamed Musse Omar. "A comparative study of WLAN security protocols: WPA, WPA2." In 2015 International Conference on Advances in Electrical Engineering (ICAEE). IEEE, 2015. http://dx.doi.org/10.1109/icaee.2015.7506822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yonglei, Zhigang Jin, and Ying Wang. "Survey on Security Scheme and Attacking Methods of WPA/WPA2." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, and Behrang Samadi. "A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Noh, Jaewon, Jeehyeong Kim, Giwon Kwon, and Sunghyun Cho. "Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography." In 2016 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia). IEEE, 2016. http://dx.doi.org/10.1109/icce-asia.2016.7804782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Tien-Ho, Jiunn-Wu Lin, Chia-Mei Chen, and Gu-Hsin Lai. "The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual?" In 2018 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 2018. http://dx.doi.org/10.1109/desec.2018.8625156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Chia-Mei, and Tien-Ho Chang. "The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient Method." In 2015 10th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2015. http://dx.doi.org/10.1109/asiajcis.2015.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography