A Simple Algebraic Representation of Rijndael
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Wireless Communications Security
Wireless Communications Security
Cisco Wireless LAN Security
An analysis of wireless security
Journal of Computing Sciences in Colleges
Choosing the Right Wireless LAN Security Protocol for the Home and Business User
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
802.11 Wireless Networks: The Definitive Guide, Second Edition
802.11 Wireless Networks: The Definitive Guide, Second Edition
Honeypot technologies and their applicability as a strategic internal countermeasure
International Journal of Information and Computer Security
Performance analysis of evolving wireless IEEE 802.11 security architectures
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
Computer Standards & Interfaces
Weighted trust evaluation-based malicious node detection for wireless sensor networks
International Journal of Information and Computer Security
International Journal of Information and Computer Security
A new methodology to implement the AES algorithm using partial and dynamic reconfiguration
Integration, the VLSI Journal
Related-Key Cryptanalysis of the Full AES-192 and AES-256
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
REputation based Clustering Algorithm for security management in ad hoc networks with liars
International Journal of Information and Computer Security
An ontology-based approach to react to network attacks
International Journal of Information and Computer Security
Honeypot detection in advanced botnet attacks
International Journal of Information and Computer Security
AES Encryption Algorithm Based on the High Performance Computing of GPU
ICCSN '10 Proceedings of the 2010 Second International Conference on Communication Software and Networks
Real-Life Paradigms of Wireless Network Security Attacks
PCI '11 Proceedings of the 2011 15th Panhellenic Conference on Informatics
A countermeasure algorithm for password guessing attacks
International Journal of Information and Computer Security
Feature: Hacking wifi the easy way
Network Security
Hi-index | 0.00 |
Wi-Fi protected access 2 WPA2 is considered one of the most secure protocols employed in wireless local area networks WLANs. This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.