• DocumentCode
    2565553
  • Title

    Survey on Security Scheme and Attacking Methods of WPA/WPA2

  • Author

    Liu, Yonglei ; Jin, Zhigang ; Wang, Ying

  • Author_Institution
    Sch. of Comput. Sci. & Technol., Tianjin Univ., Tianjin, China
  • fYear
    2010
  • fDate
    23-25 Sept. 2010
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    As the critical security flaw of WEP is discovered, concern of researchers is more and more attracted by the scheme of WPA/WPA2 which includes 802.1X, authentication protocol, and TKIP and CCMP encryption algorithms. In this paper, an overview of WPA/WPA2 is supplied. And then, the vulnerabilities of WPA/WPA2 and current researches in the method of attacking WPA/WPA2 are introduced. In the last part, these researches are analyzed and concluded.
  • Keywords
    cryptographic protocols; data privacy; message authentication; telecommunication security; 802.1X; CCMP encryption algorithm; TKIP encryption algorithm; WEP; WPA/WPA2; attacking method; authentication protocol; security scheme; Authentication; Encryption; Microwave integrated circuits; Phase shift keying; Protocols; Radiation detectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-1-4244-3708-5
  • Electronic_ISBN
    978-1-4244-3709-2
  • Type

    conf

  • DOI
    10.1109/WICOM.2010.5601275
  • Filename
    5601275