DocumentCode :
2565553
Title :
Survey on Security Scheme and Attacking Methods of WPA/WPA2
Author :
Liu, Yonglei ; Jin, Zhigang ; Wang, Ying
Author_Institution :
Sch. of Comput. Sci. & Technol., Tianjin Univ., Tianjin, China
fYear :
2010
fDate :
23-25 Sept. 2010
Firstpage :
1
Lastpage :
4
Abstract :
As the critical security flaw of WEP is discovered, concern of researchers is more and more attracted by the scheme of WPA/WPA2 which includes 802.1X, authentication protocol, and TKIP and CCMP encryption algorithms. In this paper, an overview of WPA/WPA2 is supplied. And then, the vulnerabilities of WPA/WPA2 and current researches in the method of attacking WPA/WPA2 are introduced. In the last part, these researches are analyzed and concluded.
Keywords :
cryptographic protocols; data privacy; message authentication; telecommunication security; 802.1X; CCMP encryption algorithm; TKIP encryption algorithm; WEP; WPA/WPA2; attacking method; authentication protocol; security scheme; Authentication; Encryption; Microwave integrated circuits; Phase shift keying; Protocols; Radiation detectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-3708-5
Electronic_ISBN :
978-1-4244-3709-2
Type :
conf
DOI :
10.1109/WICOM.2010.5601275
Filename :
5601275
Link To Document :
بازگشت