Penetration testing of WPA and WPA2 security protocols and analysis of security solutions

Authors

Keywords:

network security, WPA, WPA2, security protocols, security solutions

Abstract

This paper will discuss the security protocols of wireless computer networks. WEP, WPA / WPA2 encryption and the reasons for the existence of such protocols and how they are applied will be explained. The security of WEP and WPA / WPA2 protocols will be tested with practical examples and penetration testing in a secure environment, using Airgeddon and Pixiewps tools. The operating system to be used is ParrotOS.

References

Beaver K., Davis P.,Hacking wireless networks for dummies, Indianapolis, Wiley Publishing 2005.

Jevremović S., Bezbednost elektronskog poslovanja, Beograd, ITS, 2015.

Jevremović S.,Sigurnost i zaštita informacionih sistema, ITS, 2015.

Macaulay T., Hardening IEEE 802.11 wireless networks, Canada, EWA, 2002.

Monte M., Network attacks and exploitation, Indianapolis, John Wiley & Sons Inc., 2015

Osterhage W., Wireless network security, Frankfurt, Goethe-Universität, 2018

Wifi certified WPA3,

<https://www.wi-fi.org/discover-wi-fi/security>( visited on28.11.2020)

Dragonblood: Analyzing the DragonflyHandshake of WPA3 and EAP-pwd,

<https://eprint.iacr.org/2019/383.pdf>(visited on04.12.2020)

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2,

<https://papers.mathyvanhoef.com/ccs2017.pdf>(visited on02.12.2020)

Saračević M., Selimi A., Plojović Š., Some Specific Examples of Attacks on Information Systems and Smart Cities Applications, in Book: Cybersecurity and Secure Information Systems, Springer Nature Switzerland AG, 2019.

Downloads

Published

2022-06-29

How to Cite

Rajn, L., Pavlovic, N., & Plojović, Šemsudin. (2022). Penetration testing of WPA and WPA2 security protocols and analysis of security solutions. Annals of Spiru Haret University. Economic Series, 22(1). Retrieved from https://anale.spiruharet.ro/economics/article/view/1157

Issue

Section

ACADEMIA PAPERS