Penetration testing of WPA and WPA2 security protocols and analysis of security solutions
Keywords:
network security, WPA, WPA2, security protocols, security solutionsAbstract
This paper will discuss the security protocols of wireless computer networks. WEP, WPA / WPA2 encryption and the reasons for the existence of such protocols and how they are applied will be explained. The security of WEP and WPA / WPA2 protocols will be tested with practical examples and penetration testing in a secure environment, using Airgeddon and Pixiewps tools. The operating system to be used is ParrotOS.References
Beaver K., Davis P.,Hacking wireless networks for dummies, Indianapolis, Wiley Publishing 2005.
Jevremović S., Bezbednost elektronskog poslovanja, Beograd, ITS, 2015.
Jevremović S.,Sigurnost i zaštita informacionih sistema, ITS, 2015.
Macaulay T., Hardening IEEE 802.11 wireless networks, Canada, EWA, 2002.
Monte M., Network attacks and exploitation, Indianapolis, John Wiley & Sons Inc., 2015
Osterhage W., Wireless network security, Frankfurt, Goethe-Universität, 2018
Wifi certified WPA3,
<https://www.wi-fi.org/discover-wi-fi/security>( visited on28.11.2020)
Dragonblood: Analyzing the DragonflyHandshake of WPA3 and EAP-pwd,
<https://eprint.iacr.org/2019/383.pdf>(visited on04.12.2020)
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2,
<https://papers.mathyvanhoef.com/ccs2017.pdf>(visited on02.12.2020)
Saračević M., Selimi A., Plojović Š., Some Specific Examples of Attacks on Information Systems and Smart Cities Applications, in Book: Cybersecurity and Secure Information Systems, Springer Nature Switzerland AG, 2019.
Downloads
Published
How to Cite
Issue
Section
License
The Annals of Spiru Haret University. Economic Series operates under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, granting authors full copyright of their work without restrictions. This licensing framework ensures that the journal’s content can be shared and adapted non-commercially, provided appropriate credit is given and derivative works are distributed under the same terms.
By adhering to these principles, the journal reaffirms its commitment to promoting high-caliber research and supporting the global exchange of economic knowledge.