Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - Exposing WPA2 security protocol vulnerabilities
AU - Tsitroulis, Achilleas
AU - Lampoudis, Dimitris
AU - Tsekleves, Emmanuel
PY - 2014/1/1
Y1 - 2014/1/1
N2 - Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.
AB - Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.
KW - wireless security
KW - 802.11 security
KW - wifi protected access 2
KW - WPA2 vulnerabilities
KW - WPA
KW - privacy
KW - authentication
KW - wireless LANS
KW - local area networks
KW - WLANs
KW - security protocols
KW - network security
KW - malicious attacks
U2 - 10.1504/IJICS.2014.059797
DO - 10.1504/IJICS.2014.059797
M3 - Journal article
VL - 6
SP - 93
EP - 107
JO - International Journal of Information and Computer Security
JF - International Journal of Information and Computer Security
SN - 1744-1765
IS - 1
ER -