Analyzing Attacking methods on Wi-Fi wireless networks pertaining (WEP, WPA-WPA2) security protocols
DOI:
https://doi.org/10.21533/pen.v9.i4.1011Abstract
The technology of wireless network systems has eased the possibility to communicate utilising the electromagnetic waves which leads to eliminating the major barriers in portable communications. Wireless networks have a vital role in the current era that all devices; ranging from local modems to organizational equipment, are using various coding approaches to exchange data on the network. However, since the wireless networks utilise the air, as the communication medium, that results to confront more vulnerabilities. If an attacker penetrates a wireless network, he/she would be capable to attack users connected to the network. Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and WPA2 are the common security protocols that play the most significant role in local and organizational wireless communication. Accordingly, this study analysed the attacking methods in WEP, WPA, and WPA2 coding protocols. The main objective of the current study is to identify the security vulnerabilities related to these three protocols and define optimal solutions to improve the security of wireless networks against the attackers. The findings presented in this study would support users to maintain security of their home wireless networks as well as employees to secure the organizational network.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.




