scispace - formally typeset
Open AccessJournal ArticleDOI

Hacking and Security of Encrypted Access Points in Wireless Network

Se-Hwan Kwon, +1 more
- 30 Jun 2012 - 
- Vol. 10, Iss: 2, pp 156-161
Reads0
Chats0
TLDR
The Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC are described and the method of successful AP hacking is analyzed, and an approach to enhancing wireless LAN security is proposed.
Abstract
An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users’ personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Design and Fabrication of an End-Launched Rectangular Waveguide Adapter Fed by a Coaxial Loop

TL;DR: An end-launched adapter combining a coaxial loop within a rectangular waveguide has been analyzed and designed and the accurate electromagnetic modeling of input impedance for the adapter design has been developed using a modal analysis method.
Journal ArticleDOI

Fusion of Hierarchical Behavior-based Actions in Mobile Robot Using Fuzzy Logic

TL;DR: The simulation results indicate that complex tasks can be performed by a combination of a few simple behaviors and a set of fuzzy inference rules.
Book ChapterDOI

Enhanced Secure Authentication for Mobile RFID Healthcare System in Wireless Sensor Networks

TL;DR: This paper analyzed authentication for healthcare system architecture to apply secure mobile health systems in the hospital environment and estimates optimal requirements to implement topology of system and its vulnerabilities.
Journal ArticleDOI

Antenna Radiation Efficiency of the Korean NDGPS Based on Radiation Power Measurements

TL;DR: The antenna radiation efficiencies of DGPS are deduced from the propagation power in this paper and the service area for the Korean nationwide-DGPS is analyzed and evaluated.
Journal Article

A Study on Wireless Intrusion Prevention System based on Snort

TL;DR: The signature-based detection with Snort Wireless and ipTables uses Wireless attack detection and prevention measures to implement a wireless intrusion prevention system and a mock hacking can be conducted to validate the performance of the system.
References
More filters
Journal ArticleDOI

Per Packet Authentication Scheme Using One-bit in 802.11 Wireless LAN

TL;DR: This paper analyzes problems of 1-bit Authentication mechanism and proposes new algorithm which synchronizes sender with receiver, at once, using duplicated-packet-count information and improves success probability of packet authentication up to and efficiency of authentication bit stream up to.
Related Papers (5)