2021
DOI: 10.4236/wet.2021.122002
|View full text |Cite
|
Sign up to set email alerts
|

Wi-Fi: WPA2 Security Vulnerability and Solutions

Abstract: The Internet of Things (IoT) is an emerging network infrastructure with more than five devices owned by a single user. Wireless connectivity forms the backbone of such infrastructure. IoT uses diverse wireless communication technologies such as IEEE 802.15.4, Wi-Fi, Zigbee, Bluetooth, RFID, BLE (Bluetooth Low Energy), and various other cellular technologies. Wi-Fi is most suitable for IoT Home or office networks. Practically wireless signals do not adhere to the boundaries of the office or home, or organizatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 6 publications
(7 reference statements)
0
4
0
Order By: Relevance
“…Cryptographic failure is a symptom rather than a cause. Cryptographic failures can result from a variety of factors, including weak encryption algorithms, insecure key management, improperly configured encryption, and cryptographic side-channel attacks, [24], [25].…”
Section: Cryptographic Failuresmentioning
confidence: 99%
“…Cryptographic failure is a symptom rather than a cause. Cryptographic failures can result from a variety of factors, including weak encryption algorithms, insecure key management, improperly configured encryption, and cryptographic side-channel attacks, [24], [25].…”
Section: Cryptographic Failuresmentioning
confidence: 99%
“…IEEE 802.11 defines models, namely pre-Robust and robust security networks, to secure the information Exchange in wireless networks. The Pre-RSN (Robust Security Networks) includes Wired Equivalent Privacy (WEP), and Wi-Fi protected Access (WPA), while as RSN model uses a four-way handshake to provide authentication [4].…”
Section: Wlan Protocolsmentioning
confidence: 99%
“…Commercial WPA uses 802.1x +EAP for authentication and replaces WEP with TKIP in this mode; no pre-shared key (PSK) is used but instead RADIUS server is required [4]. Using a PSK of less than 20 characters is very unsafe.…”
Section: Wpamentioning
confidence: 99%
See 1 more Smart Citation