Skip to main content
Skip main navigation
No Access

Exposing WPA2 security protocol vulnerabilities

Published Online:pp 93-107https://doi.org/10.1504/IJICS.2014.059797

Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.

Keywords

wireless security, 802.11 security, Wi-Fi protected access 2, WPA2, Wi-Fi protected access, WPA, WPA2 vulnerabilities, privacy, authentication, wireless security enhancement

References

  • 1. (accessed 13 October 2012) AirTight networks [online] http://www.airtightnetworks.com/WPA2-Hole196 Google Scholar
  • 2. (accessed 13 October 2012) ASCII Table and Description, Extended ASCII codes [online] http://www.asciitable.com/ Google Scholar
  • 3. Bicakci, K. , Tavli, B. (2009). ‘Denial-Of-Service attacks and countermeasures in IEEE 802.11 wireless networks’. Computer Standards & Interfaces. 31, 5, 931-941 Google Scholar
  • 4. Biryukov, A. , Khovratovich, D. (2009). ‘Related-key cryptanalysis of the full AES-192 and AES-256’. Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin:Springer , 1-18 Google Scholar
  • 5. Bradbury, D. (2011). ‘Hacking Wi-Fi the easy way’. Network Security. (accessed 13 October 2012), [online] http://www.sciencedirect.com/science/article/pii/S1353485811700149 Google Scholar
  • 6. Cam-Winget, N. , Housley, R. , Wagner, D. , Walker, J. ‘Security flaws in 802.11 data link protocols’. Communications of the ACM – Wireless Networking Security. 2003, 05, 35-39 Google Scholar
  • 7. Changhua, H. , Mitchel, J. (2006). Security Analysis and Improvements for IEEE 802.lli. (accessed 13 October 2012), [online] http://theory.stanford.edu/~jcm/papers/NDSS05.pdf Google Scholar
  • 8. Chibiao, L. , Jame, Y. (2007). ‘A solution to WLAN Authentication and Association Attacks’. International Journal of Computer Science. 34, 1, 1-6 Google Scholar
  • 9. Committee on National Security Systems (2003). National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information. (accessed 13 October 2012), [offline] http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf Google Scholar
  • 10. Cuppens-Boulahia, N. , Cuppens, F. , Autrel, F. , Debar, H. (2009). ‘An ontology-based approach to react to network attacks’. Int. J. of Information and Computer Security. 3, 3/4, 280-305 AbstractGoogle Scholar
  • 11. Deshpande, A.M. , Deshpande, M.S. , Kayatanavar, D.N. (2009). ‘FPGA implementation of AES encryption and decryption’. in INCACEC 2009: Control, Automation, Communication and Energy Conservation. DC, USA:IEEE Computer Society Washington , 1-6 Google Scholar
  • 12. Dongsheng, Y. , Kai, C. (2011). ‘A research into the latent danger of WLAN’. ICCSE 2011: Proceedings of the 6th International Conference on Computer Science & Education. DC, USA:IEEE Computer Society Washington , 1085-1090 Google Scholar
  • 13. Edney, J. , Arbaugh, W.A. (2003). Real 802.11 Security Wi-Fi Protected Access and 802.11i. Boston, USA:Addison-Wesley Professional Google Scholar
  • 14. Elhdhili, M.E. , Azzouz, L.B. , Kamoun, F. (2009). ‘REputation based clustering algorithm for security management in ad hoc networks with liars’. Int. J. of Information and Computer Security. 3, 3/4, 228-244 AbstractGoogle Scholar
  • 15. Ferguson, N. , Schroeppel, R. , Whiting, D. (2001). ‘A simple algebraic representation of Rijndael’. 8th Annual International Workshop, Selected Areas in Cryptography, Toronto:Springer , 103-111 Google Scholar
  • 16. Gast, M.S. (2005). 802.11 Wireless Networks: The Definitive Guide. 2nd ed., California:O’Reilly Media Google Scholar
  • 17. Gin, A. , Hunt, R. (2008). ‘Performance analysis of evolving wireless IEEE 802.11 security architectures’. Mobility ‘08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems. NY, USA:ACM New York Google Scholar
  • 18. Glass, S. , Muthukkumarasamy, V. (2005). ‘A study of the TKIP cryptographic DoS attack’. ICON 2007: Proceedings of the 15th IEEE International Conference on Networks. DC, USA:IEEE Computer Society Washington , 59-65 Google Scholar
  • 19. Gold, S. (2011). ‘Cracking wireless networks’. Network Security. 2011, 11, 14-18 Google Scholar
  • 20. Granado-Criado, J.M. , Vega-Rodriguez, M.A. , Sanchez-Perez, J.M. , Gomez-Pulido, J.A. (2010). ‘A new methodology to implement the AES algorithm using partial and dynamic reconfiguration’. Integration, the VLSI Journal. 43, 1, 72-80 Google Scholar
  • 21. Hu, H. , Chen, Y. , Ku, W. , Su, Z. , Chen, C. (2009). ‘Weighted trust evaluation-based malicious node detection for wireless sensor networks’. Int. J. of Information and Computer Security. 3, 2, 132-149 AbstractGoogle Scholar
  • 22. Hytnen, R. , Garcia, M. (2006). ‘An analysis of wireless security’. Journal of Computing Sciences in College. 21, 4, 210-216 Google Scholar
  • 23. Imai, H. , Mohammad, G.R. , Kazukuni, K. (2005). Wireless Communications Security. London, UK:Artech House Google Scholar
  • 24. Lashkari, A.H. , Samadi, B. , Danesh, M.M.S. (2009). ‘Wireless security protocols (WEP, WPA and WPA2/802.11i)’. ICCSN ‘10: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. USA:IEEE Computer Society Washington, DC , 48-52 Google Scholar
  • 25. Liu, Y. , Jin, Z. , Wang, Y. (2010). ‘Survey on security scheme and attacking methods of WPA/WPA2’. WiCOM 2010: Proceedings of the 6th International Conference on Wireless Communications Networking and Mobile Computing. USA:IEEE Computer Society Washington, DC , 1-4 Google Scholar
  • 26. Malekzadeh, M. , Azim, A. , Ghani, A. , Zulkarnain, Z.A. , Muda, Z. (2007). ‘Security Improvement for Management frames in IEEE 802.11 wireless networks’. International Journal of Computer Science and Network Security. 7, 6, 276-284 Google Scholar
  • 27. Maple, C. (2006). ‘Choosing the right wireless LAN security protocol for the home and business user’. ARES ‘06: Proceedings of the First International Conference on Availability, Reliability and Security. USA:IEEE Computer Society Washington, DC , 1025-1032 Google Scholar
  • 28. Mavridis, I.P. , Androulakis, A.I.E. , Halkias, A.B. , Mylonas, P. (2011). ‘Real-life paradigms of wireless network security attacks’. PCI 2011: Proceedings of the 15th Panhellenic Conference on Informatics. USA:IEEE Computer Society Washington, DC , 112-116 Google Scholar
  • 29. Odhiambo, O.N. , Biermann, E. , Noel, G. (2009). ‘An integrated security model for WLAN’. AFRICON, 2009: AFRICON ‘09. USA:IEEE Computer Society Washington, DC , 1-6 Google Scholar
  • 30. Sankar, K. , Sri, S. , Balinsky, A. , Miller, D. (2006). Cisco Wireless LAN Security. Indiana:Cisco Press Google Scholar
  • 31. Secure Wireless Access Point Configuration (2006). (accessed 13 October 2012), [online] http://technet.microsoft.com/en-us/library/cc875845.aspx Google Scholar
  • 32. Shao, F. , Chang, Z. , Zhang, Y. (2010). ‘AES encryption algorithm based on the high performance computing of GPU’. ICCSN ‘10: Proceedings of the Second International Conference Communication on Software and Networks. USA:IEEE Computer Society Washington, DC , 588-590 Google Scholar
  • 33. Sodiya, A. , Afolorunso, A.A. , Ogunderu, O. (2011). ‘A countermeasure algorithm for password guessing attacks’. Int. J. of Information and Computer Security. 4, 4, 345-364 AbstractGoogle Scholar
  • 34. Valli, C. (2007). ‘Honeypot technologies and their applicability as a strategic internal countermeasure’. Int. J. of Information and Computer Security. 1, 4, 430-436 AbstractGoogle Scholar
  • 35. Wang, P. , Wu, L. , Cunningham, R. , Zou, C. (2010). ‘Honeypot detection in advanced botnet attacks’. Int. J. of Information and Computer Security. 4, 1, 30-51 AbstractGoogle Scholar
  • 36. Wi-Fi Alliance (2005). Deploying Wi-Fi Protected Access (WPATM) and WPA2TM in the Enterprise. (accessed 13 October 2012), [online] http://www.wi-fi.org/files/wp_9_WPA-WPA2%20Implementation_2-27-05.pdf Google Scholar
  • 37. WPA Wireless Security for Home Network (2006). (accessed 25 October 2012), [online] http://www.microsoft.com/windowsxp/using/networking/expert/bowman_03july28.mspx Google Scholar
  • 38. Wu, C. , Liu, T. , Huang, C. , Irwin, J.D. (2009). ‘Modelling and simulations for identity-based privacy-protected access control filter (IPACF) capability to resist massive denial of service attacks’. Int. J. of Information and Computer Security. 3, 2, 195-223 AbstractGoogle Scholar
  • 39. Zhang, Y. , Sampalli, S. (2010). ‘Client-based intrusion prevention system for 802.11 wireless LANs’. WiMob2010: Proceedings of the 6th International Conference IEEE 2010 on Wireless and Mobile Computing, Networking and Communications. USA:IEEE Computer Society Washington, DC , 100-107 Google Scholar