Wireless Security: Challenges and Solutions
VerifiedAdded on 2020/05/11
|21
|4955
|66
AI Summary
This assignment presents a detailed exploration of wireless security, encompassing various aspects like vehicular ad-hoc networks (VANET), wireless mesh networks, and sensor networks. It delves into prominent security protocols such as WEP and WPA, highlighting their vulnerabilities and proposed countermeasures. The assignment further examines the challenges posed by evolving threats and discusses potential cryptographic solutions for enhancing wireless network security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURITY ISSUES IN WPA2
Security issues in wireless protocols:
A case study of WPA2
Name of the Student:
Name of the University:
Author note:
Security issues in wireless protocols:
A case study of WPA2
Name of the Student:
Name of the University:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITY ISSUES IN WPA2
Table of Contents
Part 2: Research paper report.....................................................................................................2
Chapter 1: Introduction..............................................................................................................4
1.1Background of the topic........................................................................................................4
1.2Research aims and objectives................................................................................................5
1.3Research questions................................................................................................................5
1.4 Research rationale................................................................................................................5
Chapter 2: Literature review......................................................................................................7
2.1 Overview of the wireless protocols and WPA2...................................................................7
2.2 Vulnerabilities in WPA2......................................................................................................8
2.3 Minimizing Security Threats................................................................................................9
2.4 Approaches to mitigate the issues........................................................................................9
Chapter 3: Methodology..........................................................................................................11
3.1 Research methodology.......................................................................................................11
3.2 Research approach.............................................................................................................11
3.3 Research philosophy..........................................................................................................12
3.4 Research design..................................................................................................................13
3.5 Data collection process......................................................................................................13
3.6 Data analysis process.........................................................................................................13
3.7 Sample and sampling technique.........................................................................................14
3.8 Ethical issues......................................................................................................................14
Chapter 4: Findings and analysis.............................................................................................15
4.1 Qualitative analysis............................................................................................................15
Chapter 5: Conclusion and recommendations..........................................................................17
5.1 Conclusion..........................................................................................................................17
5.2 Recommendations..............................................................................................................17
Bibliography.............................................................................................................................18
Table of Contents
Part 2: Research paper report.....................................................................................................2
Chapter 1: Introduction..............................................................................................................4
1.1Background of the topic........................................................................................................4
1.2Research aims and objectives................................................................................................5
1.3Research questions................................................................................................................5
1.4 Research rationale................................................................................................................5
Chapter 2: Literature review......................................................................................................7
2.1 Overview of the wireless protocols and WPA2...................................................................7
2.2 Vulnerabilities in WPA2......................................................................................................8
2.3 Minimizing Security Threats................................................................................................9
2.4 Approaches to mitigate the issues........................................................................................9
Chapter 3: Methodology..........................................................................................................11
3.1 Research methodology.......................................................................................................11
3.2 Research approach.............................................................................................................11
3.3 Research philosophy..........................................................................................................12
3.4 Research design..................................................................................................................13
3.5 Data collection process......................................................................................................13
3.6 Data analysis process.........................................................................................................13
3.7 Sample and sampling technique.........................................................................................14
3.8 Ethical issues......................................................................................................................14
Chapter 4: Findings and analysis.............................................................................................15
4.1 Qualitative analysis............................................................................................................15
Chapter 5: Conclusion and recommendations..........................................................................17
5.1 Conclusion..........................................................................................................................17
5.2 Recommendations..............................................................................................................17
Bibliography.............................................................................................................................18
2SECURITY ISSUES IN WPA2
Part 2: Research paper report
Abstract
Without the need of a system, minimal effort and auto-oversaw, adaptable as well as low
power shopper, wireless communication is getting to be plainly developing innovation. It
demonstrates incredible fastener for present and additionally future hello there tech
applications. Expanding dependence on wireless communication additionally conveys
incredible difficulties to the safety efforts and other connected issues. In spite of the fact that
the recently presented rectified security standard, IEEE 802.11i, offers broad security for the
wireless condition yet it is as yet untimely and does not give viable measures to shield the
wireless systems from privacy and trustworthiness dangers. The objective of this paper is to
test the foremost security issues, difficulties and crucial security prerequisites of wireless
interchanges on the bases of their proposed arrangements.
Keywords: WPA2, KRACKs, Key Reinstallation Attacks
Part 2: Research paper report
Abstract
Without the need of a system, minimal effort and auto-oversaw, adaptable as well as low
power shopper, wireless communication is getting to be plainly developing innovation. It
demonstrates incredible fastener for present and additionally future hello there tech
applications. Expanding dependence on wireless communication additionally conveys
incredible difficulties to the safety efforts and other connected issues. In spite of the fact that
the recently presented rectified security standard, IEEE 802.11i, offers broad security for the
wireless condition yet it is as yet untimely and does not give viable measures to shield the
wireless systems from privacy and trustworthiness dangers. The objective of this paper is to
test the foremost security issues, difficulties and crucial security prerequisites of wireless
interchanges on the bases of their proposed arrangements.
Keywords: WPA2, KRACKs, Key Reinstallation Attacks
3SECURITY ISSUES IN WPA2
Chapter 1: Introduction
1.1 Background of the topic
Wireless protocols are utilized as a part of numerous applications in society (Bartariya
& Rastogi, 2016). On the other hand, security researchers have discovered vulnerability in
Wi-Fi Protected Access 2. It is one of the types of encryption, which is utilized in order to
secure Wi-Fi networks. The particular network gives unique encryption keys for client
connected with wireless network. The WPA2 encryption scheme has been broken by leaving
connections of Wi-Fi open for future attackers that could utilize an attack in order to read
information. It is not believed to secure as it is encrypted. ‘KRACK’ or Key Reinstallation
Attack means third parties can eavesdrop on a particular network having private
conversations. It needs to be no longer in some of the circumstances so that private as Wi-Fi
traffic passing between computers as well as access points that could be picked up with the
help of cyber criminals within the range of Wi-Fi potential victim.
These limitations make security in wireless protocols a test. In this article we show a
review of security issues in wireless protocols (Jing et al. 2014). These issues are grouped
into five classes: cryptography, key administration, secure directing, secure information
accumulation, and interruption location. It is additionally brought up the open research issues
in each subarea and finish up with conceivable future research bearings on security in
wireless protocols. The vulnerability dubbed as KRACKs or Key Reinstallation Attacks,
which is considered as a set of several vulnerabilities. In addition, it cloud allow the attackers
intercepting as well as stealing data. Digital information over internet includes license
number of the devices, social security number and credit card numbers.
Chapter 1: Introduction
1.1 Background of the topic
Wireless protocols are utilized as a part of numerous applications in society (Bartariya
& Rastogi, 2016). On the other hand, security researchers have discovered vulnerability in
Wi-Fi Protected Access 2. It is one of the types of encryption, which is utilized in order to
secure Wi-Fi networks. The particular network gives unique encryption keys for client
connected with wireless network. The WPA2 encryption scheme has been broken by leaving
connections of Wi-Fi open for future attackers that could utilize an attack in order to read
information. It is not believed to secure as it is encrypted. ‘KRACK’ or Key Reinstallation
Attack means third parties can eavesdrop on a particular network having private
conversations. It needs to be no longer in some of the circumstances so that private as Wi-Fi
traffic passing between computers as well as access points that could be picked up with the
help of cyber criminals within the range of Wi-Fi potential victim.
These limitations make security in wireless protocols a test. In this article we show a
review of security issues in wireless protocols (Jing et al. 2014). These issues are grouped
into five classes: cryptography, key administration, secure directing, secure information
accumulation, and interruption location. It is additionally brought up the open research issues
in each subarea and finish up with conceivable future research bearings on security in
wireless protocols. The vulnerability dubbed as KRACKs or Key Reinstallation Attacks,
which is considered as a set of several vulnerabilities. In addition, it cloud allow the attackers
intercepting as well as stealing data. Digital information over internet includes license
number of the devices, social security number and credit card numbers.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4SECURITY ISSUES IN WPA2
1.2 Research aims and objectives
The research aims to find out the security issues associated with WPA2. Additionally,
the research will critically analyze the issues and based on that recommendations will be
provided to minimize the issues.
The research objectives are as followed.
To find out the security issues involved with WPA2
To critically analyze the security issues and find out the loop holes
To recommend solutions to overcome the security issues in WPA2
1.3 Research questions
What are the security issues involved with WPA2?
How to overcome the security issues in WPA2?
1.4 Research rationale
As Wi-Fi Protected Access 2 becomes one of the types of encryption, it is important
to secure that. However, security analysts have found major vulnerability in WPA 2. There
are several weakness included in the Wi-Fi standard. Thus, users require updating the
products when security becomes available. On the other hand, it is needed to execute key
reinstallation. Additionally, the major attack is occurred in 4-way handshake of WPA2
protocol. It is usually executed while a client joins a protected Wi-Fi network. It is utilized in
order to confirm client as well as access point possess appropriate credentials. Presently,
modern protected Wi-Fi networks use the process. Hence, it becomes important to research
on the security issues involved with WPA2.
On the other hand, widespread as well as practical impact is considered as one of the
key reinstallation attacks against the type of attack. Moreover, adversaries can utilize the
attack for decrypting packets that are sent by the customers. The decryption of packets is
1.2 Research aims and objectives
The research aims to find out the security issues associated with WPA2. Additionally,
the research will critically analyze the issues and based on that recommendations will be
provided to minimize the issues.
The research objectives are as followed.
To find out the security issues involved with WPA2
To critically analyze the security issues and find out the loop holes
To recommend solutions to overcome the security issues in WPA2
1.3 Research questions
What are the security issues involved with WPA2?
How to overcome the security issues in WPA2?
1.4 Research rationale
As Wi-Fi Protected Access 2 becomes one of the types of encryption, it is important
to secure that. However, security analysts have found major vulnerability in WPA 2. There
are several weakness included in the Wi-Fi standard. Thus, users require updating the
products when security becomes available. On the other hand, it is needed to execute key
reinstallation. Additionally, the major attack is occurred in 4-way handshake of WPA2
protocol. It is usually executed while a client joins a protected Wi-Fi network. It is utilized in
order to confirm client as well as access point possess appropriate credentials. Presently,
modern protected Wi-Fi networks use the process. Hence, it becomes important to research
on the security issues involved with WPA2.
On the other hand, widespread as well as practical impact is considered as one of the
key reinstallation attacks against the type of attack. Moreover, adversaries can utilize the
attack for decrypting packets that are sent by the customers. The decryption of packets is
5SECURITY ISSUES IN WPA2
possible as the reinstallation attack can cause transmit nonce to be reset in initial value. Thus,
it is critical to find the solution for mitigating the issue and leads to research on the same.
possible as the reinstallation attack can cause transmit nonce to be reset in initial value. Thus,
it is critical to find the solution for mitigating the issue and leads to research on the same.
6SECURITY ISSUES IN WPA2
Chapter 2: Literature review
2.1 Overview of the wireless protocols and WPA2
Productive design and usage of wireless sensor systems has turned into a important
segment of research (Kumar, Jain & Barwal, 2014). By systems administration substantial
quantities of small sensor hubs, it is conceivable to acquire information about physical
wonders that was troublesome or difficult to get in more regular ways. In the coming years,
as advances in small scale manufacture innovation permit the cost of assembling sensor hubs
to keep on dropping, expanding arrangements of wireless sensor systems are normal, with the
systems in the long run developing to huge quantities of hubs.
Potential applications for such expansive scale wireless sensor systems exist in an
assortment of fields, including restorative checking natural observing reconnaissance, home
security, military operations, and modern machine observing. In order to comprehend the
assortment of applications that can be bolstered by wireless sensor systems, consider the
accompanying two illustrations (Shabana et al. 2016). These are circulated all through a
territory, for example, a war zone. A reconnaissance application can be planned over this
sensor system to give data to an end-client about nature. In such a sensor arrange, movement
designs are many-to-one, where the activity can go from crude sensor information to
abnormal state portrayal of what is happening in nature, if information preparing is done
locally.
The application will have some nature of administration (QoS) necessities from the
sensor arrange, such as requiring a base rate sensor scope in a zone where a marvel is relied
upon to happen, or requiring a most extreme likelihood of missed location of an occasion
(Mejri et al. 2014). In the meantime, it is required to give this nature of administration to
quite a while (months or even years) utilizing the restricted assets of the system (e.g., sensor
Chapter 2: Literature review
2.1 Overview of the wireless protocols and WPA2
Productive design and usage of wireless sensor systems has turned into a important
segment of research (Kumar, Jain & Barwal, 2014). By systems administration substantial
quantities of small sensor hubs, it is conceivable to acquire information about physical
wonders that was troublesome or difficult to get in more regular ways. In the coming years,
as advances in small scale manufacture innovation permit the cost of assembling sensor hubs
to keep on dropping, expanding arrangements of wireless sensor systems are normal, with the
systems in the long run developing to huge quantities of hubs.
Potential applications for such expansive scale wireless sensor systems exist in an
assortment of fields, including restorative checking natural observing reconnaissance, home
security, military operations, and modern machine observing. In order to comprehend the
assortment of applications that can be bolstered by wireless sensor systems, consider the
accompanying two illustrations (Shabana et al. 2016). These are circulated all through a
territory, for example, a war zone. A reconnaissance application can be planned over this
sensor system to give data to an end-client about nature. In such a sensor arrange, movement
designs are many-to-one, where the activity can go from crude sensor information to
abnormal state portrayal of what is happening in nature, if information preparing is done
locally.
The application will have some nature of administration (QoS) necessities from the
sensor arrange, such as requiring a base rate sensor scope in a zone where a marvel is relied
upon to happen, or requiring a most extreme likelihood of missed location of an occasion
(Mejri et al. 2014). In the meantime, it is required to give this nature of administration to
quite a while (months or even years) utilizing the restricted assets of the system (e.g., sensor
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7SECURITY ISSUES IN WPA2
vitality and channel data transfer capacity) while requiring almost no outside mediation.
Meeting these objectives requires watchful outline of both the sensor equipment and the
system conventions.
An alternate application area that can influence utilization of wireless sensor to
arrange innovation can be found in the territory of medicinal observing (Mahmood, Javaid &
Razzaq, 2015). This field ranges from checking patients in the healing center utilizing
wireless sensors to evacuate the limitations of tying patients to enormous, cumbersome, wired
observing gadgets, to checking patients in mass setback circumstances. In these situations,
the sensors shift from smaller than normal, body-worn sensors to outer sensors, for example,
camcorders or situating gadgets.
2.2 Vulnerabilities in WPA2
Various security flaws in Wi-Fi Protected Access 2 protocol have been disclosed that
is exposed in wireless devices to KRACK as the proof of concept exploit. It compromises
encryption mechanism of WPA2. In includes manipulation as well as replaying cryptographic
messages (Gounaris, 2014). The procedure of establishing parameters for the systems as well
as devices is processed in order to communicate with each other.
On the other hand, it is used for securing Wi-Fi enabled devices as well as hardware
through authorization as well as encryption mechanisms. KRACK enable attackers to
eavesdrop on the traffic of network traversing between the particular device and access point
of Wi-Fi.
As per the statement of the researchers, there are 41% of android devices are
susceptible to several types of KRACK when Linux systems has an impact on this (Gounaris,
2014). The security flaws are designated with CVE identifiers that can be explained as
followed.
vitality and channel data transfer capacity) while requiring almost no outside mediation.
Meeting these objectives requires watchful outline of both the sensor equipment and the
system conventions.
An alternate application area that can influence utilization of wireless sensor to
arrange innovation can be found in the territory of medicinal observing (Mahmood, Javaid &
Razzaq, 2015). This field ranges from checking patients in the healing center utilizing
wireless sensors to evacuate the limitations of tying patients to enormous, cumbersome, wired
observing gadgets, to checking patients in mass setback circumstances. In these situations,
the sensors shift from smaller than normal, body-worn sensors to outer sensors, for example,
camcorders or situating gadgets.
2.2 Vulnerabilities in WPA2
Various security flaws in Wi-Fi Protected Access 2 protocol have been disclosed that
is exposed in wireless devices to KRACK as the proof of concept exploit. It compromises
encryption mechanism of WPA2. In includes manipulation as well as replaying cryptographic
messages (Gounaris, 2014). The procedure of establishing parameters for the systems as well
as devices is processed in order to communicate with each other.
On the other hand, it is used for securing Wi-Fi enabled devices as well as hardware
through authorization as well as encryption mechanisms. KRACK enable attackers to
eavesdrop on the traffic of network traversing between the particular device and access point
of Wi-Fi.
As per the statement of the researchers, there are 41% of android devices are
susceptible to several types of KRACK when Linux systems has an impact on this (Gounaris,
2014). The security flaws are designated with CVE identifiers that can be explained as
followed.
8SECURITY ISSUES IN WPA2
CVE-2017-13081
CVE-2017-13080
CVE-2017-13082
CVE-2017-13079
CVE-2017-13084
2.3 Minimizing Security Threats
It is important to identify the issues included in WPA 2 in order to find out effective
solutions for these. The issues are as per the following:
•Present security plans for Wireless Personal Area Networks (WPANs) are juvenile.
•There is no appropriate representation strategy display for wireless communications
•Security display for wired system not really compelling for wireless systems
•Compressed Real time Transport Protocol (CRTP) isn't fitting for wireless
connections that have a high and sporadic piece mistake rate (BER) (Cavallari et al. 2014).
•Inadequate security combination plot for heterogeneous systems.
•The current wireless brilliant home framework has go confinement issue.
2.4 Approaches to mitigate the issues
Security threats, vulnerabilities, battery control and inappropriate security models.
The research on security issues and difficulties in wireless correspondence involves execution
suggestions because of various components (Sen, 2013). The impacts of these components or
issue territories have been tended to by utilizing distinctive instruments, calculations, models,
recreations and plan alterations. These sub spaces and the methodologies or philosophies are
examined:
CVE-2017-13081
CVE-2017-13080
CVE-2017-13082
CVE-2017-13079
CVE-2017-13084
2.3 Minimizing Security Threats
It is important to identify the issues included in WPA 2 in order to find out effective
solutions for these. The issues are as per the following:
•Present security plans for Wireless Personal Area Networks (WPANs) are juvenile.
•There is no appropriate representation strategy display for wireless communications
•Security display for wired system not really compelling for wireless systems
•Compressed Real time Transport Protocol (CRTP) isn't fitting for wireless
connections that have a high and sporadic piece mistake rate (BER) (Cavallari et al. 2014).
•Inadequate security combination plot for heterogeneous systems.
•The current wireless brilliant home framework has go confinement issue.
2.4 Approaches to mitigate the issues
Security threats, vulnerabilities, battery control and inappropriate security models.
The research on security issues and difficulties in wireless correspondence involves execution
suggestions because of various components (Sen, 2013). The impacts of these components or
issue territories have been tended to by utilizing distinctive instruments, calculations, models,
recreations and plan alterations. These sub spaces and the methodologies or philosophies are
examined:
9SECURITY ISSUES IN WPA2
Securing Wireless Network against Vulnerabilities
The IEEE 802.11i change has finished up to manage security issues in wireless
neighborhood yet real dangers like DoSthreats, insider threats and disconnected speculating
threats are still searched for thought. An enhanced confirmation component present can
defeat this obliviousness. This incorporated assurance for, invalid information outlines,
EAPOL outlines, administration outlines and additionally insurance from some crucial
DoSthreats, Offline speculating threats and insider threats (Mukherjee et al. 2014). This
validation instrument is additionally competent to enable stations to sort out themselves
naturally. In addition, as the vulnerability does not have any impact to the router of Wi-Fi
network, it is required to protect the password. The new vulnerability puts data at the risks
put data at risks as it affects the devices as well as Wi-Fi.
Securing Wireless Network against Vulnerabilities
The IEEE 802.11i change has finished up to manage security issues in wireless
neighborhood yet real dangers like DoSthreats, insider threats and disconnected speculating
threats are still searched for thought. An enhanced confirmation component present can
defeat this obliviousness. This incorporated assurance for, invalid information outlines,
EAPOL outlines, administration outlines and additionally insurance from some crucial
DoSthreats, Offline speculating threats and insider threats (Mukherjee et al. 2014). This
validation instrument is additionally competent to enable stations to sort out themselves
naturally. In addition, as the vulnerability does not have any impact to the router of Wi-Fi
network, it is required to protect the password. The new vulnerability puts data at the risks
put data at risks as it affects the devices as well as Wi-Fi.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10SECURITY ISSUES IN WPA2
Chapter 3: Methodology
3.1 Research methodology
In this section, the procedure for investigate is characterized to recognize the most
reasonable approach that can be embraced to secure the coveted outcomes and yields from
the specific research. Research approaches, certain hypotheses and ideas are received to have
better and more profound investigation on the chose subject for examine. The execution of
the exploration technique comprehends the method being received to break down the
different components that influence the subjective conclusion of the security issues lied in
wireless protocols.
3.2 Research approach
A research approach is required with the goal that the setup required coordinating the
investigation is revealed (Mackey & Gass, 2015). A particular investigation subject can be
endeavoured for contemplate in two wide techniques for either deductive or inductive.
Inductive approach is an investigation that associates in thinking about a research moment
that enough data on the blessed one isn't available. The basic time of inductive philosophy is
discernment that helpers in expanding noteworthy information and develops the method for
the research in like way.
Regardless that inductive approach fills the need of new theory working for any
subject. However, deductive approach is used as a method that portrays the sensible
utilization of the theories focused on to get to substance of the research paper. Deductive
procedure hopes to develop a theory with more points of interest and thoughts of data
research. Regardless, dependent upon the method for the research and research subject, the
assurance for investigation strategy is enhanced that can help in research of the point.
Chapter 3: Methodology
3.1 Research methodology
In this section, the procedure for investigate is characterized to recognize the most
reasonable approach that can be embraced to secure the coveted outcomes and yields from
the specific research. Research approaches, certain hypotheses and ideas are received to have
better and more profound investigation on the chose subject for examine. The execution of
the exploration technique comprehends the method being received to break down the
different components that influence the subjective conclusion of the security issues lied in
wireless protocols.
3.2 Research approach
A research approach is required with the goal that the setup required coordinating the
investigation is revealed (Mackey & Gass, 2015). A particular investigation subject can be
endeavoured for contemplate in two wide techniques for either deductive or inductive.
Inductive approach is an investigation that associates in thinking about a research moment
that enough data on the blessed one isn't available. The basic time of inductive philosophy is
discernment that helpers in expanding noteworthy information and develops the method for
the research in like way.
Regardless that inductive approach fills the need of new theory working for any
subject. However, deductive approach is used as a method that portrays the sensible
utilization of the theories focused on to get to substance of the research paper. Deductive
procedure hopes to develop a theory with more points of interest and thoughts of data
research. Regardless, dependent upon the method for the research and research subject, the
assurance for investigation strategy is enhanced that can help in research of the point.
11SECURITY ISSUES IN WPA2
In the present research, the subject will endeavour to consider the thoughts related to
gathering of security issues related to wireless protocols with the help of various theoretical
data. The distinctive segments associated with security issues related to wireless protocols
required a decision of philosophy that can help in understanding at a much correct and clear
way. In any case, inductive strategy fails to be executed in the present subject, as the pro
highlights no new thoughts or speculations.
3.3 Research philosophy
In a research approach, usage of research rationale helps in choosing the best possible
approach to increase inconspicuous components of an investigation point (Brinkmann, 2014).
On the other hand, research methodology for evaluating a particular point can vary so the
assurance of investigation of the research questions ought to be feasible and in authentic
game plan. The far reaching and normal sorts of epistemology that is a bit of approaches are
positivism, interpretivism and legitimacy.
Positivism as a subject of thinking associates being used of method of reasoning that
aides in inspecting the canvassed realities and information in an investigative way. However,
instructed by investigative system, positivism tries to rejects control so unobtrusive
component observation and picking up social event is engaged. Interpretivism as a technique
for epistemology support the possibility of complex structure required in a social universe of
business and organization works out. In the present research paper, positivism philosophy is
taken. Positivism as associated in the present setting helps in better research of the disguised
assurances and information related to the diverse parts security issues related to wireless
protocols. Besides that, nature of the investigation is time-limited so interpretative or
credibility considers was discarded quite recently like the choice of investigation
discernment.
In the present research, the subject will endeavour to consider the thoughts related to
gathering of security issues related to wireless protocols with the help of various theoretical
data. The distinctive segments associated with security issues related to wireless protocols
required a decision of philosophy that can help in understanding at a much correct and clear
way. In any case, inductive strategy fails to be executed in the present subject, as the pro
highlights no new thoughts or speculations.
3.3 Research philosophy
In a research approach, usage of research rationale helps in choosing the best possible
approach to increase inconspicuous components of an investigation point (Brinkmann, 2014).
On the other hand, research methodology for evaluating a particular point can vary so the
assurance of investigation of the research questions ought to be feasible and in authentic
game plan. The far reaching and normal sorts of epistemology that is a bit of approaches are
positivism, interpretivism and legitimacy.
Positivism as a subject of thinking associates being used of method of reasoning that
aides in inspecting the canvassed realities and information in an investigative way. However,
instructed by investigative system, positivism tries to rejects control so unobtrusive
component observation and picking up social event is engaged. Interpretivism as a technique
for epistemology support the possibility of complex structure required in a social universe of
business and organization works out. In the present research paper, positivism philosophy is
taken. Positivism as associated in the present setting helps in better research of the disguised
assurances and information related to the diverse parts security issues related to wireless
protocols. Besides that, nature of the investigation is time-limited so interpretative or
credibility considers was discarded quite recently like the choice of investigation
discernment.
12SECURITY ISSUES IN WPA2
3.4 Research design
Research design helps in clearing up the structure of the research subject that will help
in assurance of the gathering and research design (Gast& Ledford, 2014). In the midst of the
strategy of data collection, a particular kind of approach is associated that helpers in better
portrayal of the investigation design. The different sorts of research outline that can be
connected in scholarly research are as exploratory, informative and graphic.
Exploratory layout helps an expert in perceiving diverse sorts of musings and
contemplations required to complete a research paper. Regardless, educational investigation
design depicts the occasion of scenes or events and correspondingly effect of the episode. In
light of the irrelevant illumination of conditions and final products relationship, penetration
inconspicuous components of an investigation get the opportunity to be obliged. At last,
illustrative investigation goes for grabbing purposes of enthusiasm as to state occasion of
events with unobtrusive component and fitting depiction of the topic. In the research,
descriptive research design is selected for having several advantages and suitability with the
research.
3.5 Data collection process
Data is considered as a significant component in any exploration to comprehend the
truth and realities required for investigation on a specific subject (Neuman& Robson, 2014).
Data collection is valuable in deciding exact outcomes to a research technique and permits
standard development of the exploration in a specific range. In the present research, data from
primary sources like survey questionnaire is collected.
3.6 Data analysis process
Quantitative data is valuable in recording account kind of data that can incorporate
better delineation of the research point (Tuohy et al. 2013). Quantitative data helps in
3.4 Research design
Research design helps in clearing up the structure of the research subject that will help
in assurance of the gathering and research design (Gast& Ledford, 2014). In the midst of the
strategy of data collection, a particular kind of approach is associated that helpers in better
portrayal of the investigation design. The different sorts of research outline that can be
connected in scholarly research are as exploratory, informative and graphic.
Exploratory layout helps an expert in perceiving diverse sorts of musings and
contemplations required to complete a research paper. Regardless, educational investigation
design depicts the occasion of scenes or events and correspondingly effect of the episode. In
light of the irrelevant illumination of conditions and final products relationship, penetration
inconspicuous components of an investigation get the opportunity to be obliged. At last,
illustrative investigation goes for grabbing purposes of enthusiasm as to state occasion of
events with unobtrusive component and fitting depiction of the topic. In the research,
descriptive research design is selected for having several advantages and suitability with the
research.
3.5 Data collection process
Data is considered as a significant component in any exploration to comprehend the
truth and realities required for investigation on a specific subject (Neuman& Robson, 2014).
Data collection is valuable in deciding exact outcomes to a research technique and permits
standard development of the exploration in a specific range. In the present research, data from
primary sources like survey questionnaire is collected.
3.6 Data analysis process
Quantitative data is valuable in recording account kind of data that can incorporate
better delineation of the research point (Tuohy et al. 2013). Quantitative data helps in
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13SECURITY ISSUES IN WPA2
incorporating theoretical thoughts in the reasonable way that moreover prompts better
perception of the point not in the slightest degree like quantitative strategy. Quantitative
analysis method is used for analysing the data.
3.7 Sample and sampling technique
Sample is portrayed as the amount of people who are particularly or by suggestion
included or impacted by the substance of the research work. In the present research work,
secondary sources such as books, journals and websites are reviewed in order to analyze the
security issues and possible solutions to mitigate the issues.
3.8 Ethical issues
In the midst of the methodology of investigation technique, an investigator needs to
take after an arrangement of rule that assistants in recognizing the wrong and right course of
action of practices required for allocation in the midst of the system. The examiner
endeavoured to implant no outside effect on weight over the respondents for participating in
the info methodology of the investigation subject. Respondents with a sense on wilful
speculation were encouraged to appreciate the going with research point. In addition, data
will be secured under Data Protection 1998 Act.
incorporating theoretical thoughts in the reasonable way that moreover prompts better
perception of the point not in the slightest degree like quantitative strategy. Quantitative
analysis method is used for analysing the data.
3.7 Sample and sampling technique
Sample is portrayed as the amount of people who are particularly or by suggestion
included or impacted by the substance of the research work. In the present research work,
secondary sources such as books, journals and websites are reviewed in order to analyze the
security issues and possible solutions to mitigate the issues.
3.8 Ethical issues
In the midst of the methodology of investigation technique, an investigator needs to
take after an arrangement of rule that assistants in recognizing the wrong and right course of
action of practices required for allocation in the midst of the system. The examiner
endeavoured to implant no outside effect on weight over the respondents for participating in
the info methodology of the investigation subject. Respondents with a sense on wilful
speculation were encouraged to appreciate the going with research point. In addition, data
will be secured under Data Protection 1998 Act.
14SECURITY ISSUES IN WPA2
Chapter 4: Findings and analysis
By reviewing secondary sources such as books, journals and websites security issues
can be reviews as followed. Wireless Sensor Network (WSN) is a predominant innovation
that shows awesome guarantee for differing ultramodern applications both for mass open and
knowledge. Based on the finding themes have been formed that would be helpful to indentify
and mitigate the security issues in WPA2.
4.1 Qualitative analysis
Theme 1: Security issues in WPA2
Security in WPA2 is still in its new. Thus, WPA2 is confronting several security
issues and difficulties. Gounari (2014) mentioned that there is no basic model in order to
ensure security for each of the layers in a WPA2. However, present security solutions for
WPA2 are not possible against ever prevailing security threats. The existing safety efforts for
WPA2 are inadequate.
Jiang (2014) argued that the attack against the modern protected wifi networks is an
important aspect for detecting security issues in WPA2. Depending on the configuration of
network, it is possible for injecting as well as manipulating data. It is required to specifically
understand. It is important to check WPA2 box that specifically detect the threat (Yong‐lei &
Zhi‐gang, 2015). Wi-Fi Protected Access 2 is the present industry standard, which encrypts
traffic on the networks of Wi-Fi in order threat eavesdroppers.
Theme 2: Solutions for mitigating security issues
Regardless of the possibility that a solid security display is utilized, however at
whatever point interloper threats on WSN-passage, the entire system operations hampered.
The blame perseverance of WSN-door ought to be expanded to dodge single point
Chapter 4: Findings and analysis
By reviewing secondary sources such as books, journals and websites security issues
can be reviews as followed. Wireless Sensor Network (WSN) is a predominant innovation
that shows awesome guarantee for differing ultramodern applications both for mass open and
knowledge. Based on the finding themes have been formed that would be helpful to indentify
and mitigate the security issues in WPA2.
4.1 Qualitative analysis
Theme 1: Security issues in WPA2
Security in WPA2 is still in its new. Thus, WPA2 is confronting several security
issues and difficulties. Gounari (2014) mentioned that there is no basic model in order to
ensure security for each of the layers in a WPA2. However, present security solutions for
WPA2 are not possible against ever prevailing security threats. The existing safety efforts for
WPA2 are inadequate.
Jiang (2014) argued that the attack against the modern protected wifi networks is an
important aspect for detecting security issues in WPA2. Depending on the configuration of
network, it is possible for injecting as well as manipulating data. It is required to specifically
understand. It is important to check WPA2 box that specifically detect the threat (Yong‐lei &
Zhi‐gang, 2015). Wi-Fi Protected Access 2 is the present industry standard, which encrypts
traffic on the networks of Wi-Fi in order threat eavesdroppers.
Theme 2: Solutions for mitigating security issues
Regardless of the possibility that a solid security display is utilized, however at
whatever point interloper threats on WSN-passage, the entire system operations hampered.
The blame perseverance of WSN-door ought to be expanded to dodge single point
15SECURITY ISSUES IN WPA2
disappointment (Singla & Sachdeva, 2013). In a business review WSN is considered and
tossed a ping-construct DDos assault in light of the portal of WSN. Different PCs send ping
assault movement at the same time to the WSN-entryway. For the whole testing of 4 hours of
DDoS threats, processor weariness and detected information were gathered. It is plainly
watched that the registering assets of system door depletion under ping-based DDoS assault
movement. However, Sari and Karay (2015) argued that at a heap surpasses by 20% of the
ping assault, the WSN passage processor wound up noticeably 100% occupied, which caused
the WSN-door to stop gathering, detailing and recording the log sensor information.
Tsitroulis, Lampoudis and Tsekleves (2014) stated that a hub watches their
neighboring hubs and positions the neighbors in states of a put stock in vote. Trust table kept
by neighboring hubs close the public and individual dependability of hubs (Liao et al. 2013).
Notoriety table keeps notoriety perceptions for all the neighbor hubs. In the event that a hub
tosses a novel message, and that isn't affirmed by every single other hub, at that point the
unwavering quality of the hub is under inquiry, and furthermore the un-trust an incentive for
the hub increments.
This message comes to bunch pioneer, by every single other hub about a particular
hub, it transmit the data with the goal that every single other hub dismiss the dishonest hub
and it is disposed of from the system. The present area following plans has their own
particular limits in following wireless interlopers. The adjustment for Triangulation technique
introduce in looks to defeat this restriction (Mukherjee et al. 2014). It will be initially that
aggressor is inside the building or outside, at that point searching for nearest values in the
databases.
disappointment (Singla & Sachdeva, 2013). In a business review WSN is considered and
tossed a ping-construct DDos assault in light of the portal of WSN. Different PCs send ping
assault movement at the same time to the WSN-entryway. For the whole testing of 4 hours of
DDoS threats, processor weariness and detected information were gathered. It is plainly
watched that the registering assets of system door depletion under ping-based DDoS assault
movement. However, Sari and Karay (2015) argued that at a heap surpasses by 20% of the
ping assault, the WSN passage processor wound up noticeably 100% occupied, which caused
the WSN-door to stop gathering, detailing and recording the log sensor information.
Tsitroulis, Lampoudis and Tsekleves (2014) stated that a hub watches their
neighboring hubs and positions the neighbors in states of a put stock in vote. Trust table kept
by neighboring hubs close the public and individual dependability of hubs (Liao et al. 2013).
Notoriety table keeps notoriety perceptions for all the neighbor hubs. In the event that a hub
tosses a novel message, and that isn't affirmed by every single other hub, at that point the
unwavering quality of the hub is under inquiry, and furthermore the un-trust an incentive for
the hub increments.
This message comes to bunch pioneer, by every single other hub about a particular
hub, it transmit the data with the goal that every single other hub dismiss the dishonest hub
and it is disposed of from the system. The present area following plans has their own
particular limits in following wireless interlopers. The adjustment for Triangulation technique
introduce in looks to defeat this restriction (Mukherjee et al. 2014). It will be initially that
aggressor is inside the building or outside, at that point searching for nearest values in the
databases.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16SECURITY ISSUES IN WPA2
Chapter 5: Conclusion and recommendations
5.1 Conclusion
From the above discussion, it can be concluded that the scope of vulnerable devices
needs to be properly identified in order to provide security measures for mitigating the issues.
WPA2 protocol secures all modern networks connected with Wi-Fi. An attacker including in
the range of a victim can be exploited the weakness utilizing the key reinstallation attacks
that is named as KRACKs. The attacks works against the modern protected Wi-Fi networks.
Thus, depending on the configuration of network, it is possible to inject as well as manipulate
data. The fundamental issues for organization of WPA2 are security threats, vulnerabilities,
battery control and dishonorable security models. This paper gives consideration on these
issues particularly in specially appointed WPA2. The investigation depends on various
proposed plots in the undertaking to secure such systems.
5.2 Recommendations
The Key Reinstallation method is one of the methods that affect both sides of
Wi-Fi networks. Thus, it is required to be patched in distinctive ways.
As mobile devices are vulnerable, it is important to ensure that the phones are
updated.
WPA 2 is one of the secured protocols for fast handoff pre-authentication.
Thus, protection of WPA2 is major concerns. In this regard, confidentiality,
integrity and availability require to be analyzed. The techniques need to be
applied for violating confidentiality and integrity.
Chapter 5: Conclusion and recommendations
5.1 Conclusion
From the above discussion, it can be concluded that the scope of vulnerable devices
needs to be properly identified in order to provide security measures for mitigating the issues.
WPA2 protocol secures all modern networks connected with Wi-Fi. An attacker including in
the range of a victim can be exploited the weakness utilizing the key reinstallation attacks
that is named as KRACKs. The attacks works against the modern protected Wi-Fi networks.
Thus, depending on the configuration of network, it is possible to inject as well as manipulate
data. The fundamental issues for organization of WPA2 are security threats, vulnerabilities,
battery control and dishonorable security models. This paper gives consideration on these
issues particularly in specially appointed WPA2. The investigation depends on various
proposed plots in the undertaking to secure such systems.
5.2 Recommendations
The Key Reinstallation method is one of the methods that affect both sides of
Wi-Fi networks. Thus, it is required to be patched in distinctive ways.
As mobile devices are vulnerable, it is important to ensure that the phones are
updated.
WPA 2 is one of the secured protocols for fast handoff pre-authentication.
Thus, protection of WPA2 is major concerns. In this regard, confidentiality,
integrity and availability require to be analyzed. The techniques need to be
applied for violating confidentiality and integrity.
17SECURITY ISSUES IN WPA2
18SECURITY ISSUES IN WPA2
Bibliography
Bartariya, S., &Rastogi, A. (2016). Security in wireless sensor networks: Attacks and
solutions. environment, 5(3).
Brinkmann, S. (2014). Interview. In Encyclopedia of Critical Psychology (pp. 1008-1010).
Springer New York.
Cavallari, R., Martelli, F., Rosini, R., Buratti, C., &Verdone, R. (2014). A survey on wireless
body area networks: Technologies and design challenges. IEEE Communications
Surveys & Tutorials, 16(3), 1635-1657.
Ding, A. Y., Crowcroft, J., Tarkoma, S., &Flinck, H. (2014). Software defined networking
for security enhancement in wireless mobile networks. Computer Networks, 66, 94-
101.
Gast, D. L., & Ledford, J. R. (Eds.). (2014). Single case research methodology: Applications
in special education and behavioral sciences. Routledge.
Gounaris, G. (2014). WiFi security and testbed implementation for WEP/WPA cracking
demonstration.
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of
existing protocols and open research issues. IEEE Communications Surveys &
Tutorials, 17(3), 1294-1312.
Jiang, Z. G. (2014). Study of Wi-Fi Security Basing on Wireless Security Standards (WEP,
WPA and WPA2). In Advanced Materials Research (Vol. 1049, pp. 1993-1996).
Trans Tech Publications.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., &Qiu, D. (2014). Security of the internet of things:
Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Bibliography
Bartariya, S., &Rastogi, A. (2016). Security in wireless sensor networks: Attacks and
solutions. environment, 5(3).
Brinkmann, S. (2014). Interview. In Encyclopedia of Critical Psychology (pp. 1008-1010).
Springer New York.
Cavallari, R., Martelli, F., Rosini, R., Buratti, C., &Verdone, R. (2014). A survey on wireless
body area networks: Technologies and design challenges. IEEE Communications
Surveys & Tutorials, 16(3), 1635-1657.
Ding, A. Y., Crowcroft, J., Tarkoma, S., &Flinck, H. (2014). Software defined networking
for security enhancement in wireless mobile networks. Computer Networks, 66, 94-
101.
Gast, D. L., & Ledford, J. R. (Eds.). (2014). Single case research methodology: Applications
in special education and behavioral sciences. Routledge.
Gounaris, G. (2014). WiFi security and testbed implementation for WEP/WPA cracking
demonstration.
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of
existing protocols and open research issues. IEEE Communications Surveys &
Tutorials, 17(3), 1294-1312.
Jiang, Z. G. (2014). Study of Wi-Fi Security Basing on Wireless Security Standards (WEP,
WPA and WPA2). In Advanced Materials Research (Vol. 1049, pp. 1993-1996).
Trans Tech Publications.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., &Qiu, D. (2014). Security of the internet of things:
Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19SECURITY ISSUES IN WPA2
Kumar, V., Jain, A., &Barwal, P. N. (2014). Wireless sensor networks: security issues,
challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A
comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
Mackey, A., &Gass, S. M. (2015). Second language research: Methodology and design.
Routledge.
Mahmood, A., Javaid, N., &Razzaq, S. (2015). A review of wireless communications for
smart grid. Renewable and sustainable energy reviews, 41, 248-260.
Mejri, M. N., Ben-Othman, J., &Hamdi, M. (2014). Survey on VANET security challenges
and possible cryptographic solutions. Vehicular Communications, 1(2), 53-66.
Mukherjee, A., Fakoorian, S. A. A., Huang, J., &Swindlehurst, A. L. (2014). Principles of
physical layer security in multiuser wireless networks: A survey. IEEE
Communications Surveys & Tutorials, 16(3), 1550-1573.
Neuman, W. L., & Robson, K. (2014). Basics of social research. Pearson Canada.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, wireless
protocols, WMN, VANET. CRC press: USA
Sari, A., & Karay, M. (2015). Comparative Analysis of Wireless Security Protocols: WEP vs
WPA. International Journal of Communications, Network and System
Sciences, 8(12), 483.
Sen, J. (2013). Security and privacy issues in wireless mesh networks: A survey. In Wireless
networks and security (pp. 189-272). Springer Berlin Heidelberg.
Kumar, V., Jain, A., &Barwal, P. N. (2014). Wireless sensor networks: security issues,
challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A
comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
Mackey, A., &Gass, S. M. (2015). Second language research: Methodology and design.
Routledge.
Mahmood, A., Javaid, N., &Razzaq, S. (2015). A review of wireless communications for
smart grid. Renewable and sustainable energy reviews, 41, 248-260.
Mejri, M. N., Ben-Othman, J., &Hamdi, M. (2014). Survey on VANET security challenges
and possible cryptographic solutions. Vehicular Communications, 1(2), 53-66.
Mukherjee, A., Fakoorian, S. A. A., Huang, J., &Swindlehurst, A. L. (2014). Principles of
physical layer security in multiuser wireless networks: A survey. IEEE
Communications Surveys & Tutorials, 16(3), 1550-1573.
Neuman, W. L., & Robson, K. (2014). Basics of social research. Pearson Canada.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, wireless
protocols, WMN, VANET. CRC press: USA
Sari, A., & Karay, M. (2015). Comparative Analysis of Wireless Security Protocols: WEP vs
WPA. International Journal of Communications, Network and System
Sciences, 8(12), 483.
Sen, J. (2013). Security and privacy issues in wireless mesh networks: A survey. In Wireless
networks and security (pp. 189-272). Springer Berlin Heidelberg.
20SECURITY ISSUES IN WPA2
Sgora, A., Vergados, D. D., &Chatzimisios, P. (2016). A survey on security and privacy
issues in wireless mesh networks. Security and Communication Networks, 9(13),
1877-1889.
Shabana, K., Fida, N., Khan, F., Jan, S. R., &Rehman, M. U. (2016). Security issues and
attacks in Wireless Sensor Networks. International Journal of Advanced Research in
Computer Science and Electronics Engineering (IJARCSEE), 5(7), pp-81.
Singla, A., &Sachdeva, R. (2013). Review on security issues and attacks in wireless sensor
networks. International Journal of Advanced Research in Computer Science and
Software Engineering, 3(4).
Tsitroulis, A., Lampoudis, D., & Tsekleves, E. (2014). Exposing WPA2 security protocol
vulnerabilities. International Journal of Information and Computer Security, 6(1), 93-
107.
Tuohy, D., Cooney, A., Dowling, M., Murphy, K., & Sixsmith, J. (2013). An overview of
interpretive phenomenology as a research methodology. Nurse Researcher, 20(6), 17-
20.
Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and
challenges. Computer Networks, 57(5), 1344-1371.
Yong‐lei, L., & Zhi‐gang, J. (2015). Distributed method for cracking WPA/WPA2‐PSK on
multi‐core CPU and GPU architecture. International Journal of Communication
Systems, 28(4), 723-742.
Zou, Y., Zhu, J., Wang, X., &Hanzo, L. (2016). A survey on wireless security: Technical
challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9),
1727-1765.
Sgora, A., Vergados, D. D., &Chatzimisios, P. (2016). A survey on security and privacy
issues in wireless mesh networks. Security and Communication Networks, 9(13),
1877-1889.
Shabana, K., Fida, N., Khan, F., Jan, S. R., &Rehman, M. U. (2016). Security issues and
attacks in Wireless Sensor Networks. International Journal of Advanced Research in
Computer Science and Electronics Engineering (IJARCSEE), 5(7), pp-81.
Singla, A., &Sachdeva, R. (2013). Review on security issues and attacks in wireless sensor
networks. International Journal of Advanced Research in Computer Science and
Software Engineering, 3(4).
Tsitroulis, A., Lampoudis, D., & Tsekleves, E. (2014). Exposing WPA2 security protocol
vulnerabilities. International Journal of Information and Computer Security, 6(1), 93-
107.
Tuohy, D., Cooney, A., Dowling, M., Murphy, K., & Sixsmith, J. (2013). An overview of
interpretive phenomenology as a research methodology. Nurse Researcher, 20(6), 17-
20.
Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and
challenges. Computer Networks, 57(5), 1344-1371.
Yong‐lei, L., & Zhi‐gang, J. (2015). Distributed method for cracking WPA/WPA2‐PSK on
multi‐core CPU and GPU architecture. International Journal of Communication
Systems, 28(4), 723-742.
Zou, Y., Zhu, J., Wang, X., &Hanzo, L. (2016). A survey on wireless security: Technical
challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9),
1727-1765.
1 out of 21
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.