Home > Research > Publications & Outputs > Exposing WPA2 security protocol vulnerabilities
View graph of relations

Exposing WPA2 security protocol vulnerabilities

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Exposing WPA2 security protocol vulnerabilities. / Tsitroulis, Achilleas; Lampoudis, Dimitris; Tsekleves, Emmanuel.
In: International Journal of Information and Computer Security, Vol. 6, No. 1, 01.01.2014, p. 93-107.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Tsitroulis, A, Lampoudis, D & Tsekleves, E 2014, 'Exposing WPA2 security protocol vulnerabilities', International Journal of Information and Computer Security, vol. 6, no. 1, pp. 93-107. https://doi.org/10.1504/IJICS.2014.059797

APA

Tsitroulis, A., Lampoudis, D., & Tsekleves, E. (2014). Exposing WPA2 security protocol vulnerabilities. International Journal of Information and Computer Security, 6(1), 93-107. https://doi.org/10.1504/IJICS.2014.059797

Vancouver

Tsitroulis A, Lampoudis D, Tsekleves E. Exposing WPA2 security protocol vulnerabilities. International Journal of Information and Computer Security. 2014 Jan 1;6(1):93-107. doi: 10.1504/IJICS.2014.059797

Author

Tsitroulis, Achilleas ; Lampoudis, Dimitris ; Tsekleves, Emmanuel. / Exposing WPA2 security protocol vulnerabilities. In: International Journal of Information and Computer Security. 2014 ; Vol. 6, No. 1. pp. 93-107.

Bibtex

@article{03197db9ae824a89b69c9174b965ad84,
title = "Exposing WPA2 security protocol vulnerabilities",
abstract = "Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.",
keywords = "wireless security, 802.11 security , wifi protected access 2 , WPA2 vulnerabilities , WPA , privacy , authentication , wireless LANS , local area networks , WLANs , security protocols , network security , malicious attacks",
author = "Achilleas Tsitroulis and Dimitris Lampoudis and Emmanuel Tsekleves",
year = "2014",
month = jan,
day = "1",
doi = "10.1504/IJICS.2014.059797",
language = "English",
volume = "6",
pages = "93--107",
journal = "International Journal of Information and Computer Security",
issn = "1744-1765",
publisher = "Inderscience Enterprises Ltd.",
number = "1",

}

RIS

TY - JOUR

T1 - Exposing WPA2 security protocol vulnerabilities

AU - Tsitroulis, Achilleas

AU - Lampoudis, Dimitris

AU - Tsekleves, Emmanuel

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.

AB - Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.

KW - wireless security

KW - 802.11 security

KW - wifi protected access 2

KW - WPA2 vulnerabilities

KW - WPA

KW - privacy

KW - authentication

KW - wireless LANS

KW - local area networks

KW - WLANs

KW - security protocols

KW - network security

KW - malicious attacks

U2 - 10.1504/IJICS.2014.059797

DO - 10.1504/IJICS.2014.059797

M3 - Journal article

VL - 6

SP - 93

EP - 107

JO - International Journal of Information and Computer Security

JF - International Journal of Information and Computer Security

SN - 1744-1765

IS - 1

ER -