Academic literature on the topic 'WPA2'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WPA2.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WPA2"

1

Chen, Chin-Ling, and Supaporn Punya. "An enhanced WPA2/PSK for preventing authentication cracking." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (August 1, 2021): 85. http://dx.doi.org/10.11591/ijict.v10i2.pp85-92.

Full text
Abstract:
Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the users in wireless networks. We have discussed the weakness of 4-way handshake procedure in Wi-Fi WPA2/PSK and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking and the result is also given.
APA, Harvard, Vancouver, ISO, and other styles
2

Bartoli, Alberto. "Understanding Server Authentication in WPA3 Enterprise." Applied Sciences 10, no. 21 (November 6, 2020): 7879. http://dx.doi.org/10.3390/app10217879.

Full text
Abstract:
In December 2019, the Wi-Fi Alliance published version 2 of WPA3, the new certification program for Wi-Fi devices that updates WPA2. This new version of WPA3 addresses, amongst other things, one of the crucial weaknesses of WPA2: in many practical deployments of enterprise Wi-Fi networks—i.e., networks in which users have personalized credentials—a device may easily be attacked by fraudulent access points claiming to have the name of the targeted network (evil twins). In this work, we present the mechanisms that WPA3 version 2 has introduced for mitigating these risks, which have become more and more relevant in recent years. We discuss the defensive power and potential impact of the various options available. Understanding the resulting scenario is important because WPA3 will determine the behavior of such a fundamental and widespread technology as enterprise Wi-Fi for many years, yet WPA3 enterprise networks may still be configured in a way that could not provide much better defensive power than WPA2.
APA, Harvard, Vancouver, ISO, and other styles
3

Sarmiento, Oscar P., Fabio G. Guerrero, and David Rey Argote. "Basic security measures for IEEE 802.11 wireless networks." Ingeniería e Investigación 28, no. 2 (May 1, 2008): 89–96. http://dx.doi.org/10.15446/ing.investig.v28n2.14898.

Full text
Abstract:
This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the understanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco networking equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively).
APA, Harvard, Vancouver, ISO, and other styles
4

Devit, Devit Satria. "Implementasi Sistem Keamanan Wi-Fi Menggunakan Sistem Operasi Kali Linux Di SMKN 5 Dumai." Journal Of Computer Science Contributions (JUCOSCO) 2, no. 1 (February 2, 2022): 57–70. http://dx.doi.org/10.31599/jucosco.v2i1.941.

Full text
Abstract:
Kemajuan teknologi pada saat ini memaksa seluruh jaringan komputer yang ada saat ini untuk mampu menunjukan bahwa model sistem keamanan terus dianggap masih sangat penting bagi pengguna yang menginginkan suatu kemanan baik dari dalam luar jaringan dikarenakan internet merupakan sebuah media jaringan komputer yang memiliki akses sangat terbuka di dunia. Tujuan dari penulisan ini adalah untuk menganalisa keamana jaringan wireless menggunakan metode WPA dan WPA2-PSK untuk mengetahui jaringan tersebut aman untuk digunakan. Selanjutnya pengujian keamanan n jaringan menggunakan Kali-Linux sebagai sistem operasi. Penganalisaan kemanan jaringan wireless menggunakan satu komputer untuk melakukan pengujian. pengujian pertama menggunakan aircrack dan pengjuian kedua menggunakan injection aircrack. Target pengujian yaitu kemanan jaringan wireless yang menggunakan metode keamanan wpa dan WPA2-PSK. Hasil yang diperoleh dapat mengetahui tingkat keamanan jaringan wireless tersebut jadi tidak akan terjadinya pembobolan keamanan pada jaringan wireless tersebut. Dan analisa keamanan menggunakan metode WPA2-PSK lebih sulit mendapatkan handshake dikarenakan memiliki keamanan yang lebih unggul.
APA, Harvard, Vancouver, ISO, and other styles
5

Shadeed Al-Mejibli, Intisar, and Dr Nawaf Rasheed Alharbe. "ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY." Iraqi Journal for Computers and Informatics 46, no. 1 (June 30, 2020): 32–39. http://dx.doi.org/10.25195/ijci.v46i1.248.

Full text
Abstract:
Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the developed hardware with software. Currently, the available security standards are (WEP, WPA, WPA2 and under development WPA3). These security standards are different in the offered security level base on the employed authentication method and encryption algorithms. The major objective of this paper is studying security standards and analyzing them based on their features. In addition to presenting a detailed review about WPA3 and its improvements over the older security standards. The conducted evaluations explained the differences among the Wi-Fi security standards in term of the offered security level, software and hardware requirements.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.

Full text
Abstract:
Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.
APA, Harvard, Vancouver, ISO, and other styles
7

Kalam, M. Zatiar Erwan, Ni Made Ary Esta Dewi Wirastuti, and I. Made Oka Widyantara. "Analisa Kinerja Penerapan Standard Protokol Keamanan IEEE 802.11 Pada Layanan Wireless Fidelity." Majalah Ilmiah Teknologi Elektro 20, no. 1 (March 1, 2021): 89. http://dx.doi.org/10.24843/mite.2021.v20i01.p10.

Full text
Abstract:
Jaringan komunikasi semakin bergantung pada WLAN, maka semakin tinggi tuntutan Quality of Service (QoS) WLAN seperti Throughput, delay, dan jitter Untuk menjaga keamanan media komunikasi data, maka digunakan mekanisme keamanan jaringan Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA), dan WPA2 [14]. Mall Bali Galeria memiliki beberapa alternatif Free WiFi. Banyaknya Wi-Fi yang terpasang menimbulkan permasalahan interferensi yang mempengaruhi unjuk kerja jaringan WiFi, MBG sendiri memiliki area Indoor dan Outdoor, Alternatif untuk mengatasi interferensi adalah dengan melakukan automasi penkanalan dengan menerapkan Channel Fly, Background Scanning dan Static Channel. Dari mekanisme keamanan, Penkanalan dan frekuensi dibuat skenario dilakukan penelitian pada setiap askes point untuk mendapatkan skenario terbaik, dari skenario yang diajukan, nilai Paket loss terbaik lingkungan indoor AP 4 dengan skenario frekuensi 5Ghz, Statik Channel, WEP-64 paket loss 0,016 ms, lingkungan outdoor AP 5 Frekuensi 5Ghz, Channel Fly, WEP-64 paket loss 0.094 ms, nilai Jitter terbaik lingkungan indoor AP 2 5Ghz Background Scanning, WPA 2, Jitter 1.336 ms, lingkungan outdoor AP 8 5Ghz, Statik Channel, WPA2-Mixed Jitter 1,116 ms, nilai Throughput terbaik lingkungan indoor AP 1 5Ghz, Statik channel, WPA2-Mixed, Throughput 78,7Mbps, untuk Outdoor AP 8 5Ghz, Background Scanning, Disable Security, Throughput 80Mbps jika dibandingkan dengan skenario eksisting performa unjuk kerja meningkat sebesar 10-30%. WEP memiliki nilai packet loss baik tetapi memiliki nilai Throughput yang lebih kecil. Static channel disarankan pada lokasi yang memiliki interferensi tinggi.
APA, Harvard, Vancouver, ISO, and other styles
8

Hidayat, Aziz Setyawan, Ulin Nuha, Yamin Nuryamin, and Suleman Suleman. "Quality Of Service Filtering Dengan Metode Filtering Mac Address Jaringan Wireless." Jurnal Teknologi Informatika dan Komputer 7, no. 1 (March 25, 2021): 52–59. http://dx.doi.org/10.37012/jtik.v7i1.502.

Full text
Abstract:
Keamanan jaringan wireless saat ini menjadi sebuah hal yang penting. Jaringan wireless yang bersifat broadcast menyebabkan rentannya celah keamanan dari sistem jaringan nirkabel ini. Maka dari itu diterapkanlah keamanan ganda di dalam sistem keamanan jaringan wireless dengan menerapkan keamanan WPA/WPA2 serta dengan filtering MAC Address. Dengan menerapkan keamanan berlapis ini diharapkan mampu untuk menjaga kualitas dan layanan dari jaringan wireless pada Kantor LPSE POLRI. Nantinya setiap pengguna yang ingin terhubung kedalam jaringan haruslah melakukan pendaftaran MAC Address dari perangkat yang akan digunakan. Filtering MAC Address diharapkan mampu mengatasi kelemahan keamanan perangkat wireless. Walaupun terdapat pengguna yang mengetahui password dari keamanan jaringan wireless namun jika perangkatnya tidak didaftarkan maka perangkat tersebut tidak akan terkoneksi ke jaringan LPSE POLRI. Pengimplementasian filtering MAC Address mampu mengoptimalkan keamanan jaringan wireless dikarenakan menggunakan keamanan jaringan berlapis. Selain menggunakan keamanan verifikasi password terhadap WPA/WPA2, firewall rule MAC Address dapat membatasi hak akses berdasarkan MAC Address perangkat.
APA, Harvard, Vancouver, ISO, and other styles
9

Prasetyo, Stefanus Eko, and Try Windranata. "PERBANDINGAN SISTEM AUTENTIKASI WPA2 EAP-PSK PADA JARINGAN WIRELESS DENGAN METODE PENETRATION TESTING MENGGUNAKAN FLUXION TOOLS." Rabit : Jurnal Teknologi dan Sistem Informasi Univrab 7, no. 1 (January 11, 2022): 43–51. http://dx.doi.org/10.36341/rabit.v7i1.2206.

Full text
Abstract:
aringan Nirkabel merupakan sekumpulan perangkat elektronik yang menghubungkan satu dengan yang lain memanfaatkan perangkat udara alias frekuensi jadi alur lintas data. Masa sekarang ini, ada banyak pengguna yang memanfaatkan WPA2-PSK ataupun WPA2-EAP menjadi security system jaringan nirkabel yang bertujuan untuk menghindari orang yang mengakses tanpa izin. Riset ini memakai teknik wireless penetration testing yang memakai fluxion tools dengan membandingkan dan menganalisis security system otentikasi WPA2 dengan EAP-PSK pada jaringan nirkabel yang bertujuan untuk mengetahui kerentanan sebuah sistem keamanan jaringan tersebut. Untuk melaksanakan penetration testing penulis mengacu terhadap “Wireless Network Penetration Testing Methodology.” Yang terdiri dari intelligence gathering, vulnerability analysis, threat modelling, password cracking, dan reporting. Dari penelitian ini akan menyimpulkan WPA2-PSK kurang aman untuk digunakan dikarenakan terlihat pada penetration testing tesrsebut WPA2-PSK berhasil dibobol dalam keadaan SSID unhide­, sedangkan WPA2-EAP berhasil dalam pembuatan Web Interface namun tidak berhasil dalam mendapatkan informasi seperti username dan passwor. Jika WPA2-PSK SSID dalam keadaan hide akan mengagalkan peretasan sehingga dari sistem keamanan kedua tersebut memiliki kelebihan dan kekurangan masing-masing tergantung kebutuhan pengguna.
APA, Harvard, Vancouver, ISO, and other styles
10

Faíscas, Diogo. "(In)Security in Wi-Fi networks: a systematic review." ARIS2 - Advanced Research on Information Systems Security 2, no. 2 (December 30, 2022): 17–23. http://dx.doi.org/10.56394/aris2.v2i2.18.

Full text
Abstract:
Everyone wants to be connected to the internet at every second of their lives. Due to the ease and speed of access, Wi-Fi networks are the main internet connection point of users. The amount and coverage of Wi-Fi networks multiplies each passing day, as all the countries are now trying to give free Wi-Fi at public places. If we search for available networks anywhere with our phone, there will be very few places where there are not at least one or two networks available. In this paper we will do a systematic review of papers and literature indexed in Google Scholar; Research Gate or IEEE and on reliable webpages like Cisco, that analyze the risk to which Wi-Fi networks are exposed and why these networks are insecure. We will specially investigate the most used wireless security protocols like WEP; WPA; WPA2 or WPA3.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "WPA2"

1

Eklund, Berggren Oscar. "Penetrationstest av WLAN : med brute force av WEP, WPA, WPA2 och WPS." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79541.

Full text
Abstract:
I en tid då datorer, mobiler och andra enheter som kan ansluta till ett WLAN är stor, kommer säkerheten i dessa WLAN spela en stor roll. Det som skiljer WLAN och LAN när det kommer till säkerheten är att informationen måste färdas trådlöst i luften, vilket kan medföra att obehöriga kan lyssna av eller försöka koppla upp sig mot det trådlösa nätverket. Valet och implementationen av kryptering av WLAN för SME och privatpersoner har en stor inverkan på säkerheten i ens WLAN. Hur enkelt är det för en obehörig person att ta sig in på ett WLAN? Denna undersökning testar WLAN som använder WEP, WPA/WPA2 PSK och WPS med hjälp av en brute force attack för att avgöra om krypteringprotokollen är lämpliga att använda sig av. Testet simuleras med en obehörig laptop som försöker ta sig in in WLAN med brute force på WLAN som använder WEP, WPA/WPA2 PSK och WPS. Program som aircrack-ng och airgeddon används för att utföra testerna.
APA, Harvard, Vancouver, ISO, and other styles
2

Akinola, Azeez Paul, and Chong Zhang. "Evaluate Security on the Internet Cafe." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21553.

Full text
Abstract:
Internet security (Network security) is a big topic that is very important in our society communication system, but it is extremely dynamic and wide in scope. This is the reason that many companies and organizations invest heavily in a dedicated infrastructure security and highly trained specialists.The aim of security monitoring and preventing the network from cyber threats requires vigilance over the network equipment. The case study of this thesis is to provide the possible solution to the problems encountered by the namely network users such as: Internet Game Center (Centrum Halmstad, Sweden) and, the Blueville Internet Cafe (Ede, Nigeria).Our research and information collected over the telephone and a visit at the nearest office. We concluded that both companies mentioned above experienced similar cyber threats. The two companies have internal and external threats such as accessing the network via ssh by using it brute force attack, network war-driver, the installation of spyware, password sniffer, viruses, SQL injection and PHP attacks (web attacks) on the networks. The cyber threats virus and spyware are among the big internet threat to users, organization and companies.We carry out experiments in the lab to tests for threats such as brute force (ssh) attack, password sniffer and war-driver in the Wireless environment. From the results, we are able to the select WPA2 using 802.1x as the best possible way to limit and reduce the strength of cyber-attacks, and as a suggested solution to the namely café problems in our report. We also list different suggestion and solution to the cyber café attacks from our research papers and information gathers from different sources such as library, internet, seminar and textbooks.
APA, Harvard, Vancouver, ISO, and other styles
3

Vojtíšek, Jindřich. "Analýza šifrovacích algoritmů ve standardu 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220648.

Full text
Abstract:
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Klepáčková, Karolína. "Aplikace pro Android na bezpečnostní monitorování komunikace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399203.

Full text
Abstract:
This diploma thesis is focused on implementation of application for security monitoring of network communication of other applications in mobile device with Android platform. Provides users information about security risks that may harm his/her privacy or device. It uses a local VPN to tunnel all data sent to the wireless network. These can be linked to an application that has sent them because the Android kernel is derived from the Linux kernel and can be used to retrieve information about established network connections and the application identifier associated with the connection. This mapping allows to get more information about an app that is potentially dangerous for your mobile device.
APA, Harvard, Vancouver, ISO, and other styles
5

Дегтяренко, А. В. "Аналіз методів захисту бездротових корпоративних мереж." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23021.

Full text
Abstract:
Дегтяренко, А. В. Аналіз методів захисту бездротових корпоративних мереж : випускна кваліфікаційна робота : 123 "Кoмп’ютepнa iнжeнepiя" / А. В. Дегтяренко ; керівник роботи В. А. Бичко ; НУ "Чернігівська політехніка", кафедра iнфopмaцiйниx тa кoмп’ютepниx cиcтeм. – Чернігів, 2021. – 50 с.
Мета аналізу: розробити об’єкт дослідження та створити бездротову мережу і покращити її технологію захисту. Та створити резервну систему електроживлення. Технології аналізу:WAP, IEEE 802.11, HTTP, WISP, WIFI. Результат роботи: Використання МАС фільтралізації. створення системи резервного електроживлення та покращення системи захисту. Робота може застосовуватися в комерційних та державних підприємствах та офісах для покращення бездротової системи та усунення хакерьских атак та для захисту інформації.
APA, Harvard, Vancouver, ISO, and other styles
6

Eriksson, Per, William Wiklund, and Elie El-Hajj. "Analys och utvärdering av trådlösa nätverk i Kalmar : En säkerhetsundersökning." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5935.

Full text
Abstract:

Syftet med arbetet är att ta reda på hur väl privatpersoner informeras om hur de ska skydda sina trådlösa nätverk och varför. Genom arbetet ska följande frågor besvaras:

- Vid beställning av bredband inklusive trådlös router från en bredbandsleverantör: informerar leverantören sina kunder om att det trådlösa nätverket bör säkras upp och varför?

- Blir man informerad om säkerheten när man köper en trådlös router i en lokal affär?

- Skyddar invånare i Kalmar generellt sett sina trådlösa nätverk?

Genom användning av kvantitativa metoder i form av observationer har vi svarat på två av frågeställningarna. En kvalitativ metod användes genom att vi skickade enkäter via e-post till fem bredbandsleverantörer.

Resultaten från vår undersökning visar att majoriteten av invånarna i Kalmar skyddar sina nätverk, men att det är vanligast med en svag kryptering. Undersökningen visar att informationen från lokala affärer och bredbandsleverantörer är bristfällig.

APA, Harvard, Vancouver, ISO, and other styles
7

Škodák, Jaroslav. "Zabezpečení bezdrátových sítí IEEE 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217503.

Full text
Abstract:
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.
APA, Harvard, Vancouver, ISO, and other styles
8

Falk, Magnus. "Snabb och säker roaming i WLAN." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2695.

Full text
Abstract:

This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market.

The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE.

Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i.

The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity.

This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.

APA, Harvard, Vancouver, ISO, and other styles
9

Marušek, Michal. "Zefektivnění zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218098.

Full text
Abstract:
Nowadays every wireless radio-communication services encompass huge type of technology used for transfer video, voice or data. Wireless communication is the most expanded branch and many companies are using this technology because of low cost and simply management. The biggest advantage is easy connection to shared wireless medium and allows users of network to move around whole covered area. The most expanded types of wireless networks are called Wireless LAN (WLAN). With rising number of WLANs is rising chance to attack shared wireless medium by hacker and many sensitive information can be stolen or modified. To avoid this chance was created the first security protocol used in WLAN called WEP. Its goal was protect data transmitted trough WLAN as strong as were protected in wired networks. Unfortunately WEP was hiding a big weakness which can be used in a crack of WLAN in a minute with the aid of special software. Example of this kid of software can be Airsnort constructed to monitor shared medium and captured every packet transferred trough this medium. Based on statistical method Airsnort can obtain hidden password in a few minutes. The second type of this software can be Aircrack-ng, which can crack hidden password without any user connected to WLAN. Aircrack-ng uses active techniques to generate network load and can obtain password more effectively and faster. The result of both cases was successful and protection of WLAN was completely cracked. Later was created new security protocol called WPA, which had to fix the cryptography weakness of previous WEP. WPA was only temporary security protocol, during standard 802.11 was developing which had to offer highest security and integrity protection of transferred data trough WLAN. For this reasons was created new version of WPA called WPA2 which satisfy requirements of standard 802.11i. Both protocols WPA/WPA2 contain weakness, which can crash security of WLAN. This crack is based on authentication PSK. Attacker during authentication is using information from four-way handshake between user of WLAN and access point. Based on this information attacker can crack password with the aid of password list attack which took approximately 30 minutes. Based on previous result is important to chose strong password contains alphanumeric string or special strings with satisfy length.
APA, Harvard, Vancouver, ISO, and other styles
10

Endrle, Pavel. "Zabezpečení standardu 802.11 a jeho možnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.

Full text
Abstract:
This master´s thesis is about 802.11 standard security techniques and their features. Particular types of this standard and its features are shown in the introduction. Wireless network security cypher alghoritm types, their features, weaknesses and principles of functions are closely described in next few chapters. Realized attacks on these security alghoritms with their principles are described and shown in the practical part of thesis. One chapter is about effectivity, accessibility and practicability valorization of these attacks in practice.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "WPA2"

1

Opdycke, Sandra. The WPA. New York, NY: Routledge, 2016. | Series: Critical moments in American: Routledge, 2016. http://dx.doi.org/10.4324/9781315743219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

DeNoon, Christopher. Posters of the WPA. Los Angeles: Wheatley Press in association with University of Washington Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Posters of the WPA. Los Angeles: Wheatley Press, in association with the University of Washington Press, Seattle, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yŏn'guwŏn, Han'guk Chŏnja T'ongsin. WPAN mit home sensŏ net'ŭwŏk'ŭ p'yojun kaebal: A standard development of WPAN and home sensor network. [Seoul]: Chŏngbo T'ongsinbu, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

The WPA guides: Mapping America. Jackson: University Press of Mississippi, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1952-, Simon F. Kevin, ed. The WPA guide to Kentucky. Lexington: University Press of Kentucky, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Project, Tennessee Writers', ed. The WPA guide to Tennessee. Knoxville: University of Tennessee Press, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Project, Minnesota Federal Writers', ed. The WPA guide to Minnesota. St. Paul: Minnesota Historical Society, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Federal Writers' Project (Pa.) and Pennsylvania Historical and Museum Commission., eds. The WPA guide to Philadelphia. Philadelphia: University of Pennsylvania Press, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lindsay, Baker T., Baker Julie P. 1943-, and United States. Work Projects Administration., eds. The WPA Oklahoma slave narratives. Norman: University of Oklahoma Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "WPA2"

1

Khasawneh, Mahmoud, Izadeen Kajman, Rashed Alkhudaidy, and Anwar Althubyani. "A Survey on Wi-Fi Protocols: WPA and WPA2." In Communications in Computer and Information Science, 496–511. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54525-2_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Atluri, Sidharth, and Revanth Rallabandi. "Deciphering WEP, WPA, and WPA2 Pre-shared Keys Using Fluxion." In Smart Computing Techniques and Applications, 377–85. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0878-0_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lounis, Karim, Steven H. H. Ding, and Mohammad Zulkernine. "Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3." In Foundations and Practice of Security, 235–52. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08147-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Chin-Ling, and Supaporn Punya. "Enhanced WPA2/PSK for Preventing Authentication Cracking." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 156–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62205-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chang, TienHo, Chiamei Chen, Hanwei Hsiao, and GuHsin Lai. "The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs." In Communications in Computer and Information Science, 118–27. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7850-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Duc, Hung Bui, Stefan Pocarovsky, Milos Orgon, and Martin Koppl. "Penetration Testing of WiFi Networks Secured by WEP and WPA/WPA2 Protocols." In Informatics and Cybernetics in Intelligent Systems, 571–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77448-6_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ge, Liang, Lianhai Wang, Lijuan Xu, and Shumian Yang. "Password Recovery for WPA/WPA2-PSK Based on Parallel Random Search with GPU." In Wireless Communications, Networking and Applications, 1149–59. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2580-5_105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ajay, Aiswarya, P. P. Amritha, and M. Sethumadhavan. "Automated WPA2 Cracking Using Improved Dictionary and WPS Pin Attack." In Lecture Notes in Electrical Engineering, 323–34. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9019-1_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pacheco de Carvalho, J. A. R., H. Veiga, C. F. Ribeiro Pacheco, and A. D. Reis. "Extended Performance Research on 5 GHz IEEE 802.11n WPA2 Laboratory Links." In Transactions on Engineering Technologies, 313–23. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0746-1_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sukhija, Swati, and Shilpi Gupta. "Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization." In Lecture Notes in Electrical Engineering, 391–97. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-3363-7_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "WPA2"

1

Liu, Yonglei. "Defense of WPA/WPA2-PSK Brute Forcer." In 2015 2nd International Conference on Information Science and Control Engineering (ICISCE). IEEE, 2015. http://dx.doi.org/10.1109/icisce.2015.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abdelrahman, A., H. Khaled, Eman Shaaban, and Wail S. Elkilani. "WPA-WPA2 PSK Cracking Implementation on Parallel Platforms." In 2018 13th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2018. http://dx.doi.org/10.1109/icces.2018.8639328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adnan, Abdillahi Hassan, Mohamed Abdirazak, A. B. M. Shamsuzzaman Sadi, Towfique Anam, Sazid Zaman Khan, Mohammed Mahmudur Rahman, and Mohamed Musse Omar. "A comparative study of WLAN security protocols: WPA, WPA2." In 2015 International Conference on Advances in Electrical Engineering (ICAEE). IEEE, 2015. http://dx.doi.org/10.1109/icaee.2015.7506822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yonglei, Zhigang Jin, and Ying Wang. "Survey on Security Scheme and Attacking Methods of WPA/WPA2." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, and Behrang Samadi. "A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moissinac, Kyle, David Ramos, Giovanna Rendon, and Abdelrahman Elleithy. "Wireless Encryption and WPA2 Weaknesses." In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2021. http://dx.doi.org/10.1109/ccwc51732.2021.9376023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hegde, Seema B., Aditya Ranjan, Aman Raj, Krishanu Paul, and Smritimay Santra. "WPA2 Based Wireless Enterprise Configuration." In 2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2021. http://dx.doi.org/10.1109/icmnwc52512.2021.9688387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Radivilova, Tamara, and Hassan Ali Hassan. "Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise." In 2017 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo). IEEE, 2017. http://dx.doi.org/10.1109/ukrmico.2017.8095429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Noh, Jaewon, Jeehyeong Kim, Giwon Kwon, and Sunghyun Cho. "Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography." In 2016 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia). IEEE, 2016. http://dx.doi.org/10.1109/icce-asia.2016.7804782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Souza, Eduardo Ferreira de, and Paulo André da S. Gonçalves. "Um Mecanismo de Autenticação Baseado em ECDH para Redes IEEE 802.11." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2010. http://dx.doi.org/10.5753/sbseg.2010.20582.

Full text
Abstract:
Em redes que utilizam os protocolos WPA, WPA2 ou IEEE 802.11i e esses dois protocolos com a emenda IEEE 802.11w, as chaves que compõem a PTK (Pairwise Transient Key) permitem que os clientes da rede possam trocar mensagens com a devida criptografia e verificação de integridade. Devido a sua importância, a PTK deve ser mantida em completo sigilo pelo protocolo. Porém, nos protocolos mencionados, o 4-Way Handshake é falho quando o método de autenticação pessoal é usado, permitindo que entidades maliciosas que possuam a PSK (Pre-Shared Key) da rede possam reproduzir o processo de derivação da chave PTK de todos os clientes autenticados. Este artigo propõe e avalia experimentalmente um novo processo de handshake. Ele é baseado no protocolo Diffie-Hellman sobre Curvas Elípticas (ECDH) e resolve o problema de derivação indevida da PTK. Além disso, também é apresentada uma solução para prover autenticação automática em redes abertas, permitindo o tráfego criptografado de informações na rede sem a necessidade do fornecimento de chaves pelos usuários.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "WPA2"

1

Author, Not Given. Wind Powering America Podcasts, Wind Powering America (WPA). Office of Scientific and Technical Information (OSTI), April 2012. http://dx.doi.org/10.2172/1041355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gollenbeek, Luuk, Jos van Gastel, Paul Bussmann, Julien Voogt, Roland Melse, and Nico Verdoes. Verkenning mogelijke mestverwerkingsroutes en duurzaamheidsaspecten : Next Level Mestverwaarden WP2. Wageningen: Wageningen Livestock Research, 2020. http://dx.doi.org/10.18174/530720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kootstra, A. M. J. Direct processing of sugar beet using Betaprocess : Chembeet WP1 and WP2. Wageningen: ACRRES, Wageningen University & Research, 2017. http://dx.doi.org/10.18174/425474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brouwer, Bastiaan, Mariska Nijenhuis-de Vries, Fátima I. Pereira da Silva, Najim El Harchioui, and Suzan Gabriëls. Postharvest quality of different papaya cultivars : GreenCHAINge Fruit & Vegetables WP2. Wageningen: Wageningen Food & Biobased Research, 2019. http://dx.doi.org/10.18174/503783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lantz, Eric, Ryan Wiser, and Maureen Hand. WP2 IEA Wind Task 26:The Past and Future Cost of Wind Energy. Office of Scientific and Technical Information (OSTI), May 2012. http://dx.doi.org/10.2172/1183175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brouwer, Bastiaan, Suzan Gabriëls, and Matthijs Montsma. Assessing quality and reducing batchvariety in Golden Honeydew Melons : GreenCHAINge Fruit & Vegetables WP2. Wageningen: Wageningen Food & Biobased Research, 2019. http://dx.doi.org/10.18174/563036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brouwer, Bastiaan, Suzan Gabriëls, and Matthijs Montsma. Assessing quality and reducing batch variety in Golden Honeydew Melons : GreenCHAINge Fruit & Vegetables WP2. Wageningen: Wageningen Food & Biobased Research, 2019. http://dx.doi.org/10.18174/503211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

van der Lee, Jan, Bockline Omedo Bebe, and Simon Oosting. Sustainable intensification pathways for dairy farming in Kenya : A case study for PROIntensAfrica WP2, Deliverable 2.3. Wageningen: Wageningen Livestock Research, 2016. http://dx.doi.org/10.18174/401333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gollenbeek, Luuk, Jos van Gastel, Flavia Casu, and Nico Verdoes. Emissies en kosten van verschillende scenario’s voor de verwaarding van kalvermest : NL Next level mestverwaarden WP2. Wageningen: Wageningen Livestock Research, 2021. http://dx.doi.org/10.18174/555424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ayers, R., G. P. Course, and G. R. Pasco. Scottish Inshore Fisheries Integrated Data System (SIFIDS): work package (2) final report WP2A: development and pilot deployment of a prototypic autonomous fisheries data harvesting system, and WP2B: investigation into the availability and adaptability of novel technological approaches to data collection. Edited by Mark James and Hannah Ladd-Jones. Marine Alliance for Science and Technology for Scotland (MASTS), 2019. http://dx.doi.org/10.15664/10023.23443.

Full text
Abstract:
[Extract from Executive Summary] To enhance sustainability and foster resilience within Scotland’s inshore fishing communities an effective system of collecting and sharing relevant data is required. To support business decisions made by vessel owners as well as informing fisheries managers and those involved in marine planning it will be vital to collect a range of information which will provide a robust understanding of fishing activity, the economic value of the sector and its importance within local communities. The SIFIDS Project was conceived to assist in attaining these goals by working alongside fishers to develop and test technology to automatically collect and collate data on board vessels, thereby reducing the reporting burden on fishers. The project built upon previous research funded through the European Fisheries Fund (EFF) and was designed to deliver a step change in the way that inshore fisheries in Scotland could be managed in cooperation with the industry. The project focussed on inshore fishing vessels around Scotland, where spatio-temporal information on the distribution of vessels and associated fishing effort is data deficient. The whole project was broken down into 12 highly integrated work packages. This is the integrated report for work packages 2A and 2B, entitled’ Development and Pilot Deployment of a Prototypic Autonomous Fisheries Data Harvesting System’ (2A) and ‘Investigation into the Availability and Adaptability of Novel Technological Approaches to Data Collection’ (2B).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography