Abstract:
The development of wireless network systems has made it easier to communicate using
electromagnetic waves, which has led to the removal of the main obstacles to portable
communication. In the modern day, where every device—from personal computers to
business equipment—uses a variety of coding techniques to share data on the network,
wireless networks play a crucial role. However, because wireless networks use the air as a
communication medium, they must deal with extra security risks. In this study we outline
the security options for WLANs. These security mechanisms are Wired Equivalent Privacy
(WEP), Wi-Fi Protected Access (WPA) and 802.11i (WPA2). Our aim is to discover
weaknesses in the WLAN security protocol through an attack that can be performed in the
system. a description of their operation, structure, and algorithmic framework. and
successfully launched attacks against WEP and WPA2 networks in an effort to discover real time vulnerabilities. Three laptops with wi-fi capabilities were used to carry out the attacks
in an ad-hoc network [12]. We start with the WEP protocol, which makes use of the weak
and readily decipherable RC4 algorithm. Next, we list a few of its shortcomings. Then, as an
enhanced version of WEP with some weaknesses, we have WPA. WPA2 vulnerabilities
explain, at last. An overview of some tools (software) an attacker uses to break security
protocols such as Aircrack-ng
Description:
Supervised by
Ms. Lutfun Nahar Lota,
Assistant Professor,
Department of Computer Science and Engineering(CSE),
Islamic University of Technology(IUT),
Board Bazar, Gazipur-1704, Bangladesh