Filters








147 Hits in 2.3 sec

Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)

Arash Habibi Lashkari, Masood Mansoor, Amir Seyed Danesh
2009 2009 International Conference on Signal Processing Systems  
Now, we try to explain all of WPA versions and problems with the best solutions and finally make a comparison between WEP and WPA.  ...  Then we are in the next phase which is to explain the structure of last standard (WPA2) and we hope that we will publish a complete comparison among wireless security techniques in the near future and  ...  WPA WEAKNESSES In November 2003, Robert Moskowitz released "Weakness in Passphrase Choice in WPA Interface".  ... 
doi:10.1109/icsps.2009.87 fatcat:2i32cl3ranculg3tg5ivitudlq

A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)

Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, Behrang Samadi
2009 2009 2nd IEEE International Conference on Computer Science and Information Technology  
Now, we try to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness.  ...  In our previous papers which registered in ICFCC 2009 Malaysia and ICCDA 2009 Singapore [1] [2], we explained the structure of WEP and WPA as first and second wireless security protocols and discussed  ...  ACKNOWLEDGMENT We would like to express our appreciation to our parents and all the teachers and lecturers who help us to understand the importance of knowledge and show us the best way to gain it.  ... 
doi:10.1109/iccsit.2009.5234856 fatcat:iwxhjkzbn5ew3fglrslllj2c4i

Penetration Testing of IEEE 802.11 Encryption Protocols using Kali Linux Hacking Tools

Michael Kyei, Michael Asante
2020 International Journal of Computer Applications  
As large number of devices connect to wireless network, valuable and sensitive information are shared among users in the open air, attackers can easily sniff and capture data packets.  ...  The use of wireless network as a medium of communication has tremendously increased due to its flexibility, mobility and easy accessibility.  ...  WPA improves data encryption using a hashing algorithm called Temporal Key Integrity Protocol (TKIP) which scramble the keys and adds an integrity check feature to prevent tampering of the encrypted keys  ... 
doi:10.5120/ijca2020920365 fatcat:jbwwc4bvnjctzm2rslaqvj4sju

An analyzing process on wireless protection criteria focusing on (WPA) within computer network security

Mustafa Raheem Neamah, Hasanian Ali Thuwaib, Baraa I. Farhan
2021 Periodicals of Engineering and Natural Sciences (PEN)  
Network security from a long ago approaches to cryptography and hash functions which are tremendous and due to the weakness of different vulnerabilities in the networks and obviously there is a significant  ...  In this manuscript, the state-of-the-art wireless environment is focused solely on the sensor technology, in which security needs to be integrated with the Wireless Protected Access (WPA) standards.  ...  Predictable Group Temporal Key (GTK) In 2016, it was brought to light that the WPA2 and WPA schemes had a vulnerability specific to an expository random number generator (RNG).  ... 
doi:10.21533/pen.v9i1.1796 fatcat:52ryrnhyzvhsjfsaakhqc4i66m

Analysis of Security in Wireless Network

Pranit Patil
2012 IOSR Journal of Engineering  
Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take.  ...  This paper proposes survey of insecurities and security mechanism levels available in wireless networks.  ...  One copy is sent to the next step, and the other is hashed (mixed) with the base key.  ... 
doi:10.9790/3021-0202315319 fatcat:ozgwre7advdlzcsvus5fhbidh4

Link-layer protection in 802.11i WLANS with dummy authentication

Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole Bai, Dong Xuan
2009 Proceedings of the second ACM conference on Wireless network security - WiSec '09  
We argue that regardless of the type of network under consideration, link-layer protection and data confidentiality are of great importance in wireless applications.  ...  In dummy authentication, we apply public-key cryptography's key-establishment technique to the 802.11 MAC protocol.  ...  The vulnerability of WPA-PSK with a weak key to dictionary attacks is not a design flaw of the standard. Still, in reality, most people use a simple password as a pre-shared secret.  ... 
doi:10.1145/1514274.1514294 dblp:conf/wisec/YangCGBX09 fatcat:xpjxr37m4rb7vhest6qf3i7fhm

Wireless security: securing mobile UMTS communications from interoperation of GSM

Eric Southern, Abdelkader Ouda, Abdallah Shami
2012 Security and Communication Networks  
As flaws in the security of a wireless network are discovered new protocols and algorithms are required to meet those security issues.  ...  There are flaws in this integration of GSM into UMTS networks. Those flaws are analyzed and two practical solutions are proposed.  ...  WPA has the endorsement of the Temporal Key Integrity Protocol (TKIP) and Message Integrity Check (MIC) by the Wi-Fi Alliance.  ... 
doi:10.1002/sec.674 fatcat:ypdl74ulpvdgrhxyyjdoe3xuvq

Real-Life Paradigms of Wireless Network Security Attacks

I.P. Mavridis, A.-I. E. Androulakis, A.B. Halkias, Ph. Mylonas
2011 2011 15th Panhellenic Conference on Informatics  
Focusing on three major types of typical wireless security standards: WEP, WPA and WPA2, we aim to explore the current state-of-the-art in security protocols and to present an overview of their real-life  ...  Keywords -WLAN, WEP, WPA, WPA2, attack against WEP, attack against WPA, tools to protect WLAN I.  ...  The weakness of WPA-PSK is based on the pairwise master key (PMK) that is derived from the concatenation of the passphrase, SSID, length of the SSID and nonces (a number or bit string used only once in  ... 
doi:10.1109/pci.2011.25 dblp:conf/pci/MavridisAHM11 fatcat:x5gb3vmap5fnvon37qp4fw44se

Security In Wireless Local Area Network (wlan)

Kareshna Zamani, Mehrnoosh Torabi, Hamidreza Moumeni
2012 Journal of Mathematics and Computer Science  
In this article, first different security methods of local wireless networks, as subsidiaries of wireless networks, are introduced and then the efficiency of so far introduced security methods such as  ...  WEP, WPA and WPAv2 are studied as well as their negative and positive aspects.  ...  Key hashing per packet and message integrity check in TKIP, are two specifications which increase WPA security. However even WPA is threatened by the hackers.  ... 
doi:10.22436/jmcs.05.04.10 fatcat:q7obgrvy7jdwnnz7pkjgbtm4iq

The Methods of Protection and Hacking of Modern Wi-Fi Networks

Taras Boretskyi, Department of Information Technology Security at Lviv Polytechnic National University
2019 Advances in Cyber-Physical Systems  
In this paper, we discuss the most popular attacks on personal Wi-Fi networks, offer some improvements to the hacking process and possible methods of protection.  ...  The methods presented in this work can be applied to both versions of the WPA protocol which use a pre-shared key.  ...  Thus, the obtained 256-bit general master key (PMK) is converted into a 128-bit unique temporal key (PTK -Pairwise Transient Key) used to encrypt data for each connected client.  ... 
doi:10.23939/acps2019.01.001 fatcat:ftspmx3s5vcxtgergkij6x75p4

Basic security measures for IEEE 802.11 wireless networks

Oscar P. Sarmiento, Fabio G. Guerrero, David Rey Argote
2008 Ingeniería e Investigación  
The WPA and WPA2 encryption protocols' most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide.  ...  Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level.  ...  Temporal key integrity protocol (TKIP) WPA encryption and integrity verification (Wi-Fi protected access) is based on the temporary key integrity protocol (TKIP) defined in clause 8.3.2 of the original  ... 
doaj:811d47b8431d4e0ca784145d72c747f9 fatcat:rbjj7c4fvjcebmt5tcibrfbbpq

Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP

Masakatu MORII, Yosuke TODO
2011 IEICE transactions on information and systems  
The IEEE Standards Association formulated some security protocols, for example, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP).  ...  Then we propose an attack that is executable in a realistic environment against WPA-TKIP. This attack exploits the vulnerability implementation in the QoS packet processing feature of IEEE 802.11e.  ...  Encryption of WPA is executed for each MPDU with the checksum. A packet key PK is generated from a 48bit IV, an encryption key K, and a MAC address by using a specific hash function for WPA, hash().  ... 
doi:10.1587/transinf.e94.d.2087 fatcat:4niuidgmnfcfzmynhe5rrmwnjy

Evaluation of Enhanced Security Solutions in 802.11-Based Networks [article]

Ifeyinwa Angela Ajah
2014 arXiv   pre-print
Comprehensive in-depth comparative analysis of each of the security mechanisms is driven by review of related work in WLAN security solutions.  ...  The work suggested using a Defence-in-Depth Strategy and integration of biometric solution in 802.11i.  ...  In WPA, a temporal encryption key, transmit address and TKIP Sequence Counter (TSC) form the input to the RC4 algorithm that generates a keystream.  ... 
arXiv:1409.2261v1 fatcat:oxoy63ou7rb5djwgd4sxzcj2wi

Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)

B. Indira Reddy, V. Srikanth
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.  ...  Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols.  ...  Arash Habibi Lashkari [1] discussed in his paper about the structure of WEP the versions of it and the weakness of WEP.  ... 
doi:10.32628/cseit1953127 fatcat:vh3r2uz3hfepzfv2csfyrhyecq

A Literature Review of Security Threats to Wireless Networks

Umesh Kumar, Sapna Gambhir
2014 International Journal of Future Generation Communication and Networking  
In the recent years we have huge development of wireless technology. We are presently getting more subject to wireless technology.  ...  The security conventions intended for the wired systems can't be extrapolated to wireless systems. Hackers and intruders can make utilization of the loopholes of the wireless communication.  ...  WPA uses the Temporal Key Integration Protocol (TKIP) algorithm for encryption. TKIP is a security protocol used in the IEEE 802.11 wireless networking standard.  ... 
doi:10.14257/ijfgcn.2014.7.4.03 fatcat:aw662nqydffercciyrrip7swxq
« Previous Showing results 1 — 15 out of 147 results