2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) 2021
DOI: 10.1109/ccwc51732.2021.9376023
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Encryption and WPA2 Weaknesses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…WPA version 3 is the most recent and secure [ 30 ]. Still, many APs run on WPA2, which has several vulnerabilities associated to it [ 31 , 32 , 33 ]. WPA2 is based on IEEE 802.11i and was ratified in 2004 [ 34 , 35 ].…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…WPA version 3 is the most recent and secure [ 30 ]. Still, many APs run on WPA2, which has several vulnerabilities associated to it [ 31 , 32 , 33 ]. WPA2 is based on IEEE 802.11i and was ratified in 2004 [ 34 , 35 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Enterprise mode utilizes an authentication server that administers individual session keys and is designed for larger networks of upwards of 10 stations [ 36 ]. The WPA2 Personal is sometimes referred to as PSK mode because the AP authenticates the user and encrypts the connection based on a single key known by all stations in the network [ 31 ].…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…After WPA was proven to have major flaws and vulnerabilities, it was replaced by WPA2 in 2004 and is still being used until now. Finally, Wi-Fi Protected Access 3 (WPA3) was released in 2018 to solve all the shortcomings of its predecessors by providing high protection and usability for its users [2].…”
Section: Introductionmentioning
confidence: 99%