Hacking and Security of Encrypted Access Points in Wireless Network
Se-Hwan Kwon,Dea-Woo Park +1 more
Reads0
Chats0
TLDR
The Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC are described and the method of successful AP hacking is analyzed, and an approach to enhancing wireless LAN security is proposed.Abstract:
An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users’ personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.read more
Citations
More filters
Journal ArticleDOI
Design and Fabrication of an End-Launched Rectangular Waveguide Adapter Fed by a Coaxial Loop
TL;DR: An end-launched adapter combining a coaxial loop within a rectangular waveguide has been analyzed and designed and the accurate electromagnetic modeling of input impedance for the adapter design has been developed using a modal analysis method.
Journal ArticleDOI
Fusion of Hierarchical Behavior-based Actions in Mobile Robot Using Fuzzy Logic
Gan Zhen Ye,Dae-Ki Kang +1 more
TL;DR: The simulation results indicate that complex tasks can be performed by a combination of a few simple behaviors and a set of fuzzy inference rules.
Book ChapterDOI
Enhanced Secure Authentication for Mobile RFID Healthcare System in Wireless Sensor Networks
TL;DR: This paper analyzed authentication for healthcare system architecture to apply secure mobile health systems in the hospital environment and estimates optimal requirements to implement topology of system and its vulnerabilities.
Journal ArticleDOI
Antenna Radiation Efficiency of the Korean NDGPS Based on Radiation Power Measurements
TL;DR: The antenna radiation efficiencies of DGPS are deduced from the propagation power in this paper and the service area for the Korean nationwide-DGPS is analyzed and evaluated.
Journal Article
A Study on Wireless Intrusion Prevention System based on Snort
TL;DR: The signature-based detection with Snort Wireless and ipTables uses Wireless attack detection and prevention measures to implement a wireless intrusion prevention system and a mock hacking can be conducted to validate the performance of the system.
References
More filters
Journal ArticleDOI
Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN
TL;DR: This paper analyzes problems of 1-bit Authentication mechanism and proposes new algorithm which synchronizes sender with receiver, at once, using duplicated-packet-count information and improves success probability of packet authentication up to and efficiency of authentication bit stream up to.
Related Papers (5)
Fusion of Hierarchical Behavior-based Actions in Mobile Robot Using Fuzzy Logic
Gan Zhen Ye,Dae-Ki Kang +1 more