Exposing WPA2 security protocol vulnerabilities

  • Authors:
  • Achilleas Tsitroulis;Dimitris Lampoudis;Emmanuel Tsekleves

  • Affiliations:
  • Brunel University, School of Engineering and Design, Kingston Lane, Uxbridge, UB8 3PH, UK;Department of Information Systems, University of Macedonia U.O.M., Greece;Lancaster University, Imagination Lancaster, LICA Building, Bailrigg, Lancaster, LA1 4YW, UK

  • Venue:
  • International Journal of Information and Computer Security
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

Wi-Fi protected access 2 WPA2 is considered one of the most secure protocols employed in wireless local area networks WLANs. This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.