Abstract
Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.
Keywords
References
- 1.
(accessed 13 October 2012) AirTight networks [online] http://www.airtightnetworks.com/WPA2-Hole196 Google Scholar - 2.
(accessed 13 October 2012) ASCII Table and Description, Extended ASCII codes [online] http://www.asciitable.com/ Google Scholar - 3. (2009). ‘Denial-Of-Service attacks and countermeasures in IEEE 802.11 wireless networks’. Computer Standards & Interfaces. 31, 5, 931-941 Google Scholar
- 4. (2009). ‘Related-key cryptanalysis of the full AES-192 and AES-256’. Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin:Springer , 1-18 Google Scholar
- 5. (2011).
‘Hacking Wi-Fi the easy way’.
Network Security.
(accessed 13 October 2012) , [online] http://www.sciencedirect.com/science/article/pii/S1353485811700149 Google Scholar - 6. ‘Security flaws in 802.11 data link protocols’. Communications of the ACM – Wireless Networking Security. 2003, 05, 35-39 Google Scholar
- 7. (2006).
Security Analysis and Improvements for IEEE 802.lli.
(accessed 13 October 2012) , [online] http://theory.stanford.edu/~jcm/papers/NDSS05.pdf Google Scholar - 8. (2007). ‘A solution to WLAN Authentication and Association Attacks’. International Journal of Computer Science. 34, 1, 1-6 Google Scholar
- 9. (2003).
National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information.
(accessed 13 October 2012) , [offline] http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf Google Scholar - 10. (2009). ‘An ontology-based approach to react to network attacks’. Int. J. of Information and Computer Security. 3, 3/4, 280-305 Abstract, Google Scholar
- 11. (2009). ‘FPGA implementation of AES encryption and decryption’. in INCACEC 2009: Control, Automation, Communication and Energy Conservation. DC, USA:IEEE Computer Society Washington , 1-6 Google Scholar
- 12. (2011). ‘A research into the latent danger of WLAN’. ICCSE 2011: Proceedings of the 6th International Conference on Computer Science & Education. DC, USA:IEEE Computer Society Washington , 1085-1090 Google Scholar
- 13. (2003). Real 802.11 Security Wi-Fi Protected Access and 802.11i. Boston, USA:Addison-Wesley Professional Google Scholar
- 14. (2009). ‘REputation based clustering algorithm for security management in ad hoc networks with liars’. Int. J. of Information and Computer Security. 3, 3/4, 228-244 Abstract, Google Scholar
- 15. (2001).
‘A simple algebraic representation of Rijndael’.
8th Annual International Workshop, Selected Areas in Cryptography , Toronto:Springer , 103-111 Google Scholar - 16. (2005). 802.11 Wireless Networks: The Definitive Guide. 2nd ed., California:O’Reilly Media Google Scholar
- 17. (2008). ‘Performance analysis of evolving wireless IEEE 802.11 security architectures’. Mobility ‘08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems. NY, USA:ACM New York Google Scholar
- 18. (2005). ‘A study of the TKIP cryptographic DoS attack’. ICON 2007: Proceedings of the 15th IEEE International Conference on Networks. DC, USA:IEEE Computer Society Washington , 59-65 Google Scholar
- 19. (2011). ‘Cracking wireless networks’. Network Security. 2011, 11, 14-18 Google Scholar
- 20. (2010). ‘A new methodology to implement the AES algorithm using partial and dynamic reconfiguration’. Integration, the VLSI Journal. 43, 1, 72-80 Google Scholar
- 21. (2009). ‘Weighted trust evaluation-based malicious node detection for wireless sensor networks’. Int. J. of Information and Computer Security. 3, 2, 132-149 Abstract, Google Scholar
- 22. (2006). ‘An analysis of wireless security’. Journal of Computing Sciences in College. 21, 4, 210-216 Google Scholar
- 23. (2005). Wireless Communications Security. London, UK:Artech House Google Scholar
- 24. (2009). ‘Wireless security protocols (WEP, WPA and WPA2/802.11i)’. ICCSN ‘10: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. USA:IEEE Computer Society Washington, DC , 48-52 Google Scholar
- 25. (2010). ‘Survey on security scheme and attacking methods of WPA/WPA2’. WiCOM 2010: Proceedings of the 6th International Conference on Wireless Communications Networking and Mobile Computing. USA:IEEE Computer Society Washington, DC , 1-4 Google Scholar
- 26. (2007). ‘Security Improvement for Management frames in IEEE 802.11 wireless networks’. International Journal of Computer Science and Network Security. 7, 6, 276-284 Google Scholar
- 27. (2006). ‘Choosing the right wireless LAN security protocol for the home and business user’. ARES ‘06: Proceedings of the First International Conference on Availability, Reliability and Security. USA:IEEE Computer Society Washington, DC , 1025-1032 Google Scholar
- 28. (2011). ‘Real-life paradigms of wireless network security attacks’. PCI 2011: Proceedings of the 15th Panhellenic Conference on Informatics. USA:IEEE Computer Society Washington, DC , 112-116 Google Scholar
- 29. (2009). ‘An integrated security model for WLAN’. AFRICON, 2009: AFRICON ‘09. USA:IEEE Computer Society Washington, DC , 1-6 Google Scholar
- 30. (2006). Cisco Wireless LAN Security. Indiana:Cisco Press Google Scholar
- 31. (2006).
(accessed 13 October 2012) , [online] http://technet.microsoft.com/en-us/library/cc875845.aspx Google Scholar - 32. (2010). ‘AES encryption algorithm based on the high performance computing of GPU’. ICCSN ‘10: Proceedings of the Second International Conference Communication on Software and Networks. USA:IEEE Computer Society Washington, DC , 588-590 Google Scholar
- 33. (2011). ‘A countermeasure algorithm for password guessing attacks’. Int. J. of Information and Computer Security. 4, 4, 345-364 Abstract, Google Scholar
- 34. (2007). ‘Honeypot technologies and their applicability as a strategic internal countermeasure’. Int. J. of Information and Computer Security. 1, 4, 430-436 Abstract, Google Scholar
- 35. (2010). ‘Honeypot detection in advanced botnet attacks’. Int. J. of Information and Computer Security. 4, 1, 30-51 Abstract, Google Scholar
- 36. (2005).
Deploying Wi-Fi Protected Access (WPATM) and WPA2TM in the Enterprise.
(accessed 13 October 2012) , [online] http://www.wi-fi.org/files/wp_9_WPA-WPA2%20Implementation_2-27-05.pdf Google Scholar - 37. (2006).
(accessed 25 October 2012) , [online] http://www.microsoft.com/windowsxp/using/networking/expert/bowman_03july28.mspx Google Scholar - 38. (2009). ‘Modelling and simulations for identity-based privacy-protected access control filter (IPACF) capability to resist massive denial of service attacks’. Int. J. of Information and Computer Security. 3, 2, 195-223 Abstract, Google Scholar
- 39. (2010). ‘Client-based intrusion prevention system for 802.11 wireless LANs’. WiMob2010: Proceedings of the 6th International Conference IEEE 2010 on Wireless and Mobile Computing, Networking and Communications. USA:IEEE Computer Society Washington, DC , 100-107 Google Scholar