dc.identifier.citation |
[1] Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D. A survey on security threats and countermeasures in internet of medical things (IoMT). Transactions on Emerging Telecommunications Technologies. 2022 Jun;33(6):e4049. [2] Gunduz, Muhammed Zekeriya, and Resul Das."Cyber-security on smart grid: Threats and potential solutions." Computer networks 169 (2020): 107094. [3] A. Alrawais, A. Alhothaily, . Hu, and X. heng, “Fog omputing for the nternet of Things: Security and rivacy ssues,” EEE nternet omput., vol. 21, no. 2, pp. 3 –42, Mar. 2017. [ ] J. Ni, . Zhang, X. Lin, and X. S. Shen, “Securing Fog omputing for nternet of Things Applications: hallenges and Solutions,” EEE ommun. Surv. Tutorials, vol. 20, no. 1, pp. 601–628, 2018 [5] Mohammed, K.K., WLAN Vulnerability Scanning Methodologies. [6] Zaidan, Doaa Talib. "Analyzing Attacking methods on Wi-Fi wireless networks pertaining (WEP, WPA WPA2) security protocols." Periodicals of Engineering and Natural Sciences (PEN) 9.4 (2021): 1093- 1101. [7] Park, Joon S., and Derrick Dicoi."Syracuse University. WLAN Security: Current and Future‖." IEEE Computer Society (2003). [8] Auslander, David M., and Jean-Dominique Decotignie."Network Fundamentals." Handbook of networked and embedded control systems. Birkhäuser Boston, 2005. 197-223. [9] Hassinen, Timo."Overview of WLAN security." Seminar on Network Security. Vol. 11. No. 12. 2006. [10] Suroto, Suroto."WLAN security: threats and countermeasures." JOIV: International Journal on Informatics Visualization 2.4 (2018): 232-238. [11] https://www.researchgate.net/figure/Analysis-of-Table-3-security-capabilities_fig4_322109575 [12] [13] Suroto, S., 2018. WLAN Security: Threats and Countermeasures. JOIV: International Journal on Informatics Visualization, 2(4), pp.232-238. [14] Aneja, A. and Sodhi, G., 2016. A Study of Security Issues Related with Wireless Fidelity (WI-FI). International Journal of Computer Science Trends and Technology (IJCST), 4(2), |
en_US |
dc.description.abstract |
The development of wireless network systems has made it easier to communicate using
electromagnetic waves, which has led to the removal of the main obstacles to portable
communication. In the modern day, where every device—from personal computers to
business equipment—uses a variety of coding techniques to share data on the network,
wireless networks play a crucial role. However, because wireless networks use the air as a
communication medium, they must deal with extra security risks. In this study we outline
the security options for WLANs. These security mechanisms are Wired Equivalent Privacy
(WEP), Wi-Fi Protected Access (WPA) and 802.11i (WPA2). Our aim is to discover
weaknesses in the WLAN security protocol through an attack that can be performed in the
system. a description of their operation, structure, and algorithmic framework. and
successfully launched attacks against WEP and WPA2 networks in an effort to discover real time vulnerabilities. Three laptops with wi-fi capabilities were used to carry out the attacks
in an ad-hoc network [12]. We start with the WEP protocol, which makes use of the weak
and readily decipherable RC4 algorithm. Next, we list a few of its shortcomings. Then, as an
enhanced version of WEP with some weaknesses, we have WPA. WPA2 vulnerabilities
explain, at last. An overview of some tools (software) an attacker uses to break security
protocols such as Aircrack-ng |
en_US |