To see the other types of publications on this topic, follow the link: WPA/WPA2.

Journal articles on the topic 'WPA/WPA2'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 journal articles for your research on the topic 'WPA/WPA2.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, Chin-Ling, and Supaporn Punya. "An enhanced WPA2/PSK for preventing authentication cracking." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (August 1, 2021): 85. http://dx.doi.org/10.11591/ijict.v10i2.pp85-92.

Full text
Abstract:
Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the users in wireless networks. We have discussed the weakness of 4-way handshake procedure in Wi-Fi WPA2/PSK and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking and the result is also given.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.

Full text
Abstract:
Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.
APA, Harvard, Vancouver, ISO, and other styles
3

Johnson, Tyler, Daniel Roggow, Phillip H. Jones, and Joseph Zambreno. "An FPGA Architecture for the Recovery of WPA/WPA2 Keys." Journal of Circuits, Systems and Computers 24, no. 07 (June 17, 2015): 1550105. http://dx.doi.org/10.1142/s0218126615501054.

Full text
Abstract:
Wi-Fi protected access (WPA) has provided serious improvements over the now deprecated wired equivalent privacy (WEP) protocol. WPA, however, still has some flaws that allow an attacker to obtain the passphrase. One of these flaws is exposed when the access point (AP) is operating in the WPA personal mode. This is the most common mode, as it is the quickest and easiest to configure. This vulnerability requires the attacker to capture the traffic from the four-way handshake between the AP and client, and then have enough compute time to reverse the passphrase. Increasing the rate at which passphrases can be reversed reduces the amount of time required to construct a repository of service set identifiers (SSIDs) and passphrases, which can increase the chances an attack is successful, or, alternatively, reduce the difficulty of auditing a wireless network for security purposes. This work focuses on creating an field programmable gate array (FPGA)-based architecture to accelerate the generation of a WPA/WPA2 pairwise master key (PMK) lookup table (LUT) for the recovery of the passphrase, with special emphasis on the secure hash algorithm-1 (SHA-1) implementation. PMK generation relies heavily on SHA-1 hashing and, as this work shows, an optimized SHA-1 implementation can achieve up to a 40 × speedup over an unoptimized implementation when generating PMKs.
APA, Harvard, Vancouver, ISO, and other styles
4

Kalam, M. Zatiar Erwan, Ni Made Ary Esta Dewi Wirastuti, and I. Made Oka Widyantara. "Analisa Kinerja Penerapan Standard Protokol Keamanan IEEE 802.11 Pada Layanan Wireless Fidelity." Majalah Ilmiah Teknologi Elektro 20, no. 1 (March 1, 2021): 89. http://dx.doi.org/10.24843/mite.2021.v20i01.p10.

Full text
Abstract:
Jaringan komunikasi semakin bergantung pada WLAN, maka semakin tinggi tuntutan Quality of Service (QoS) WLAN seperti Throughput, delay, dan jitter Untuk menjaga keamanan media komunikasi data, maka digunakan mekanisme keamanan jaringan Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA), dan WPA2 [14]. Mall Bali Galeria memiliki beberapa alternatif Free WiFi. Banyaknya Wi-Fi yang terpasang menimbulkan permasalahan interferensi yang mempengaruhi unjuk kerja jaringan WiFi, MBG sendiri memiliki area Indoor dan Outdoor, Alternatif untuk mengatasi interferensi adalah dengan melakukan automasi penkanalan dengan menerapkan Channel Fly, Background Scanning dan Static Channel. Dari mekanisme keamanan, Penkanalan dan frekuensi dibuat skenario dilakukan penelitian pada setiap askes point untuk mendapatkan skenario terbaik, dari skenario yang diajukan, nilai Paket loss terbaik lingkungan indoor AP 4 dengan skenario frekuensi 5Ghz, Statik Channel, WEP-64 paket loss 0,016 ms, lingkungan outdoor AP 5 Frekuensi 5Ghz, Channel Fly, WEP-64 paket loss 0.094 ms, nilai Jitter terbaik lingkungan indoor AP 2 5Ghz Background Scanning, WPA 2, Jitter 1.336 ms, lingkungan outdoor AP 8 5Ghz, Statik Channel, WPA2-Mixed Jitter 1,116 ms, nilai Throughput terbaik lingkungan indoor AP 1 5Ghz, Statik channel, WPA2-Mixed, Throughput 78,7Mbps, untuk Outdoor AP 8 5Ghz, Background Scanning, Disable Security, Throughput 80Mbps jika dibandingkan dengan skenario eksisting performa unjuk kerja meningkat sebesar 10-30%. WEP memiliki nilai packet loss baik tetapi memiliki nilai Throughput yang lebih kecil. Static channel disarankan pada lokasi yang memiliki interferensi tinggi.
APA, Harvard, Vancouver, ISO, and other styles
5

Jiang, Zi Gui. "Study of Wi-Fi Security Basing on Wireless Security Standards (WEP, WPA and WPA2)." Advanced Materials Research 1049-1050 (October 2014): 1993–96. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1993.

Full text
Abstract:
Wi-Fi becomes increasingly popular for people who use smart phones, tablet computers and laptops frequently. It is essentially for users to understand the security problems of Wi-Fi in order to prevent information leakage. The key wireless security standards used in IEEE 802.11 are WEP, WPA and WPA2. The main purpose of this paper is to investigate the security vulnerabilities of these three standards and attempt to conclude an optimal solution for common users.
APA, Harvard, Vancouver, ISO, and other styles
6

Jude Saskara, Gede Arna, I. Putu Oktap Indrawan, and Putu Maha Putra. "KEAMANAN JARINGAN KOMPUTER NIRKABEL DENGAN CAPTIVE PORTAL DAN WPA/WPA2 DI POLITEKNIK GANESHA GURU." Jurnal Pendidikan Teknologi dan Kejuruan 16, no. 2 (July 31, 2019): 236. http://dx.doi.org/10.23887/jptk-undiksha.v16i2.18559.

Full text
Abstract:
Pada Revolusi Industri 4.0 saat ini perkembangan jaringan komputer sudah semakin pesat. Dilihat dari media penghubung antara komputer satu dengan komputer satunya yang sebelumnya masih menggunakan kabel, sekarang ini sudah berubah menjadi tanpa menggunakan perantara kabel atau istilahnya nirkabel atau wireless. Salah satu instansi swasta yaitu Politeknik Ganesha Guru banyak memanfaatkan teknologi jaringan komputer yang bersifat nirkabel atau wireless. Penggunaan jaringan komputer nirkabel diinstansi dibangun untuk mendukung kegiatan administrasi hingga kegiatan perkuliahan di Politeknik Ganesha Guru. Perkembangan jaringan tersebut berjalan lurus dengan keamanan jaringan. Pada jaringan nirkabel banyak user dapat terhubung ke dalam jaringan sehingga dibutuhkan lapisan keamanan agar sistem maupun server yang terdapat di instansi aman. Untuk mengamankan jaringan nirkabel terdapat beberapa teknologi yang dapat digunakan untuk mengamankan jaringan beberapa diantaranya adalah menambahkan Captive Portal, RADIUS hingga Authentication dengan kriptografi seperti WPA dan WPA2. Kemanan jaringan di Politeknik Ganesha Guru sudah menerapkan lapisan keamanan Captive Portal, RADIUS dan juga Authentication dengan WPA. Untuk menguji kemanan jaringan di instansi menggunakan pengujian dengan Vulnerability Assessment dan juga Penetration Test. Dari hasil pengujian didapatkan jaringan nirkabel di Politeknik Ganesha Guru yang hanya menggunakan Captive Portal dan RADIUS, user masih dapat melakukan penyerangan terhadap jaringan, sedangkan setelah ditambahkan authentication dengan WPA, user tidak dapat melakukan serangan.
APA, Harvard, Vancouver, ISO, and other styles
7

Banakh, R. I. "AUTHENTICATION METHOD WPA/WPA2 KEY PARAMETERS’ DEFINITION FOR IEEE 802.11 BASED HONEYPOT." Radio Electronics, Computer Science, Control, no. 1 (May 29, 2018): 110–18. http://dx.doi.org/10.15588/1607-3274-2018-1-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Su, Di Xin, Zhi Xue, and Yong Shi. "Analysis of Wireless Network Security Based on 4-Way Handshake Protocol." Advanced Materials Research 1006-1007 (August 2014): 924–29. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.924.

Full text
Abstract:
With the growing popularity of network, more and more people use embedded portable devices to carry out e-commerce by wireless network. However, the security of wireless network is increasingly grim. According to the WPA/WPA2, this paper focuses on authentication issues between access point AP and wireless client STA in the wireless network security, and presents an improved protocol to resolve these problems. The improved one based on 4-way handshake protocol can resist dictionary attack, DOS attack and phishing attack. In the End, the paper analyzes the protocol.
APA, Harvard, Vancouver, ISO, and other styles
9

PETRICĂ, Gabriel. "A Study on Password Strength in Wireless Encryption Protocols." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 21–26. http://dx.doi.org/10.19107/ijisc.2019.02.02.

Full text
Abstract:
Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.
APA, Harvard, Vancouver, ISO, and other styles
10

Yong-lei, Liu, and Jin Zhi-gang. "Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture." International Journal of Communication Systems 28, no. 4 (November 25, 2013): 723–42. http://dx.doi.org/10.1002/dac.2699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Shadeed Al-Mejibli, Intisar, and Dr Nawaf Rasheed Alharbe. "ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY." Iraqi Journal for Computers and Informatics 46, no. 1 (June 30, 2020): 32–39. http://dx.doi.org/10.25195/ijci.v46i1.248.

Full text
Abstract:
Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the developed hardware with software. Currently, the available security standards are (WEP, WPA, WPA2 and under development WPA3). These security standards are different in the offered security level base on the employed authentication method and encryption algorithms. The major objective of this paper is studying security standards and analyzing them based on their features. In addition to presenting a detailed review about WPA3 and its improvements over the older security standards. The conducted evaluations explained the differences among the Wi-Fi security standards in term of the offered security level, software and hardware requirements.
APA, Harvard, Vancouver, ISO, and other styles
12

Fajri, Ahmad. "Studi Empiris terhadap Kinerja & Keamanan Wifi (Studi Kasus di Kota Depok)." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (December 2, 2019): 671. http://dx.doi.org/10.25126/jtiik.2019661832.

Full text
Abstract:
<p>Pada tahun 2012, Kota Depok memperoleh penghargaan sebagai kota <em>Information and Communication Technology </em>(ICT) dari Kementerian Komunikasi dan Informatika. Salah satu parameter berkembangnya ICT di Kota Depok adalah meningkatnya jumlah pengguna internet dari berbagai sektor terutama perkantoran, hotel dan kampus dengan memanfaatkan jaringan <em>wifi </em>sebagai media transmisinya. Pada penelitian ini, kami melakukan audit terhadap keamanan jaringan <em>wifi</em> di Kota Depok dengan cara melakukan studi lapangan kinerja dan keamanan jaringan <em>wifi</em> menggunakan teknik <em>wardriving</em>. Studi ini mencakup sekitar 536 jaringan <em>wifi</em> di Jalan Margonda Depok. Hasil studi tersebut, kami menemukan bahwa 89% jaringan <em>wifi</em> menerapkan keamanan dengan<em> </em>menggunakan protokol WPA/WPA2, 1% menggunakan protokol WEP dan 10% bersifat terbuka. Kami juga menemukan sebanyak 20% jaringan <em>wifi</em> berada pada <em>channel</em> 1 dan 19% jaringan <em>wifi</em> berada pada <em>channel</em> 6 dan 11. <em>Channel </em>1, 6 dan 11 merupakan <em>channel</em> yang terbaik bagi penggunaan jaringan <em>wifi</em> karena terbebas dari interferensi jaringan <em>wifi </em>lainnya. Oleh karena itu penilaian kinerja dan keamanan jaringan <em>wifi </em>di Kota Depok dinilai sudah baik sesuai dengan standar IEEE 802.11i yaitu tentang peningkatan pengamanan pada jaringan <em>Wifi </em>menggunakan WPA2<em> </em>dan 802.11b tentang pengaturan <em>channel wifi </em>yang tidak menimbulkan interferensi.</p><p><em><strong>Abstract</strong></em></p><p><em>In 2012, Depok City was awarded as the city of Information and Communication Technology (ICT) from the Ministry of Communication and Information Technology.<em>One of the parameters of the development of ICT in Depok City is the increasing number of internet users from various sectors, especially offices, hotels and campuses by utilizing wifi networks as the transmission media. In this study, we conducted an audit of the security of wifi networks in Depok City by conducting field studies on the performance and security of wifi networks using wardriving techniques.</em><em>This study covers about 536 wifi networks on Margonda Street Depok. The results of the study, we found that 89% of wifi networks implement security using the WPA / WPA2 protocol, 1% using the WEP protocol and 10% are open. We also found that as much as 20% of the wifi networks are on channel 1 and 19% of wifi networks are on channels 6 and 11. Channel 1, 6 and 11 are the best channels for using wifi networks because they are free from interference from other wifi networks. Therefore, performance assessment and wifi network security in Depok City are considered to be good in accordance with the IEEE </em><em>802.11i standard which is about increasing security on Wifi networks using WPA2 and 802.11b regarding wifi channel settings that do not cause interference.</em></em></p>
APA, Harvard, Vancouver, ISO, and other styles
13

Ugwoke, F. N., and K. C. Okafor. "Cloud-DLT: A Disruptive Cloud based Digital Library using Lean Design Technique." Circulation in Computer Science DC CPS 2017, no. 01 (June 5, 2017): 27–36. http://dx.doi.org/10.22632/ccs-2017-cps-04.

Full text
Abstract:
Cloud based libraries connect individuals to on-demand information needed to solve problems, expand frontiers and re-shape the future. In the era of disruptive computing, a digital library model using cloud computing Infrastructure as a Service (IaaS) is proposed. The proof of concept is used to demonstrate the viability of deploying and running virtualized digital library in Nigerian higher institutions. Lean design phases are used in developing the library application program interface (API) as well as the network design. Programming languages such as CSS, JavaScript, PHP and MYSQL are used for the API integration while demonstrating a hypervisor based server infrastructure on a Wi-Fi hotspot. For access control on the network, a network IP address configuration based on classless inter-domain routing (CIDR-192.168.0.0/24) is applied while using TP-Link 3G/4G Wireless N-Router (TL-MR3420) access point for 300Mbps wireless connectivity. Front-end vulnerability threats are addressed during the coding phase while demonstrating improvement on the level of services provided for resource accessibility and management. A faculty wide scenario in Federal University of Technology is used as a validation case study. The proposed system is flexible, offers robust security support with 64/128bit wired equivalent privacy (WEP), WPA/WPA2 and WPA-PSK/WAP2-PSK encryption standards. Cloud-DLT eradicates the challenges and inconveniences associated with accessing and managing the library resources. The work highlighted its usefulness and implications to academics and students in the next few years.
APA, Harvard, Vancouver, ISO, and other styles
14

Purwanto, Timur Dali, and Alek Wijaya. "EVALUASI APLIKASI EXPLOID WIFI DI TINGKAT AVAILABILITY DAN VULNERABILITY." Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 8, no. 2 (November 1, 2017): 801. http://dx.doi.org/10.24176/simet.v8i2.1613.

Full text
Abstract:
Pada sistem jaringan wireless sering terjadi masalah yaitu salah satunya keamanan wifi yang menggunakan keamanan WPA, WPA2, dan WEP yang ditinjau dari vulneravility. Karena teknologi wireless memanfaatkan frekwensi tinggi untuk menghantarkan sebuah komunikasi, maka kerentanan terhadap keamanan juga lebih tinggi dibanding dengan teknologi komunikasi yang lainnya. Sekarang ini sudah banyak tool aplikasi exploit wifi yang di gunakan oleh hacker atau attacker salah satunya tool Reaver dan tool Aircrack dalam system operasi kali linux, dari kedua tool tersebut peneliti ingin mencari perbandingan dari tingkat availability. Karena kedua tool tersebut menrut peneliti adalah tool yang terbaik saat ini. Dalam penelitian ini parameter yang akan di ukur adalah seberapa capat waktu ackes ke jaringan wifi, seberapa cepat menembus keamanan wifi, dan berapa besaran biter yang di dapat. Dari hasil penelitian dan uji coba maka di simpulkan bahwa untuk segi kecepatan aircrack yang lebih cepat untuk memecah password karena bruteforce dengan wordlist, reaver langsung scanning password wifi namun memakan waktu sangat lama hampir 13 jam untuk waktu terlama Kata kunci: Tool Reaver dan Aircrack, Avability dan vurnability bruteforce, wordlist
APA, Harvard, Vancouver, ISO, and other styles
15

Farabi Phasa, Fianda, Joseph Dedy Irawan, and Suryo Adi Wibowo. "SISTEM AUTENTIFIKASI HOSTPOT MENGGUNAKAN LDAP SERVER." JATI (Jurnal Mahasiswa Teknik Informatika) 4, no. 2 (October 14, 2020): 120–27. http://dx.doi.org/10.36040/jati.v4i2.2703.

Full text
Abstract:
Jaman sekarang keamanan pada sistem jaringan komputer sudah sangat berkembang pesat, selain itu juga jaringan berbasis wireless sudah sering sekali kita temukan, jaringan tersebut juga harus dikombinasikan dengan keamanan yang baik. Pada saat ini pembuatan kemanan jaringan menggunakan Wireless sudah banyak ditemukan di sekitar kita tetapi dalam situasi dan kondisi pengamanan jaringan wireless yang banyak digunakan saat ini seringkali dapat dikatakan masih belum aman. Pasalnya, keamanan yang saat ini sering sekali kita temui yaitu seperti WPA, dan WPA2. hal ini masih dapat dikategorikan tidak aman dikarenakan keamanan yang banyak digunakan saat ini masih dikategorikan mudah dalam upaya pembobolan. Untuk itu diperlukan keamanan yang mumpuni dan mudah dalam proses manajemen user. Maka dari itu penulis berencana mengembangkan keamanan jaringan menggunakan sistem authentikasi menggunakan LDAP server. Digunakan sistem authentikasi dinilai lebih aman, dikarenakan setiap pengguna akan dilakukan pengecekan identitas pada proses login ke dalam sebuah sistem jaringan. LDAP digunakan sebagai protocol direktori servis, dimana semua data user akan disimpan didalam LDAP sehingga akan lebih mempermudah dalam proses management user.. Pembuatan server menggunakan Ubuntu 14.04 (LDAP) dan Ubuntu 12.04 (Radius), dalam pembuatan server ini kedepannya akan lebih memudahkan untuk pengamanan jaringan pada user akun pengguna. Karena itu, authentikasi menggunakan LDAP menjadi pilihan penulis untuk mengatasi masalah keamanan dan manajemen user pada jaringan komputer karena dinilai lebih mudah, aman dan efisien dalam hal keamanan dan pengelolaan user dalam sebuah jaringan.
APA, Harvard, Vancouver, ISO, and other styles
16

Muis Rajab, Arini, MT,. "Pengujian Celah Keamanan 5 Jenis Metode Wireless LAN Security." JURNAL TEKNIK INFORMATIKA 4, no. 1 (October 6, 2015). http://dx.doi.org/10.15408/jti.v4i1.2011.

Full text
Abstract:
Abstract— Wireless network offer many facilities and flexibility but to support them require high serious of security. Many types of Wireless LAN security mechanisms had implemented today such WEP (Wired Equivalent Privacy), WPA/WPA2 (Wi-Fi Protected Access), MAC Filtering, and Hidden SSID, or even used WPA2 combine with RADIUS. In this topic, we will look more depth the some weakness of the Wireless LAN (WLAN) security as the way to find the solution to obtain the security policy of our WLAN. By using some testing procedure and provided of the Open source tool, we found some weakness of security problem in WLAN. Keywords : Wireless LAN, WEP (Wired Equivalent Privacy), WPA/WPA2 (Wi-Fi Protected Access), MAC Filtering, Hidden SSID, WPA2-RADIUS
APA, Harvard, Vancouver, ISO, and other styles
17

Indira Reddy, B., and V. Srikanth. "Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, July 10, 2019, 28–35. http://dx.doi.org/10.32628/cseit1953127.

Full text
Abstract:
Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.
APA, Harvard, Vancouver, ISO, and other styles
18

Chang, Tien-Ho, Chia-Mei Chen, Han-Wei Hsiao, and Gu-Hsin Lai. "Cracking of WPA & WPA2 Using GPUs and Rule-based Method." Intelligent Automation and Soft Computing, 2018, —1——1. http://dx.doi.org/10.31209/2018.100000054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography