logo

Security Issues in Wireless Protocols

21 Pages4955 Words66 Views
   

Added on  2020-05-11

Security Issues in Wireless Protocols

   Added on 2020-05-11

ShareRelated Documents
Running head: SECURITY ISSUES IN WPA2Security issues in wireless protocols:A case study of WPA2Name of the Student:Name of the University:Author note:
Security Issues in Wireless Protocols_1
1SECURITY ISSUES IN WPA2 Table of ContentsPart 2: Research paper report.....................................................................................................2Chapter 1: Introduction..............................................................................................................41.1Background of the topic........................................................................................................41.2Research aims and objectives................................................................................................51.3Research questions................................................................................................................51.4 Research rationale................................................................................................................5Chapter 2: Literature review......................................................................................................72.1 Overview of the wireless protocols and WPA2...................................................................72.2 Vulnerabilities in WPA2......................................................................................................82.3 Minimizing Security Threats................................................................................................92.4 Approaches to mitigate the issues........................................................................................9Chapter 3: Methodology..........................................................................................................113.1 Research methodology.......................................................................................................113.2 Research approach.............................................................................................................113.3 Research philosophy..........................................................................................................123.4 Research design..................................................................................................................133.5 Data collection process......................................................................................................133.6 Data analysis process.........................................................................................................133.7 Sample and sampling technique.........................................................................................143.8 Ethical issues......................................................................................................................14Chapter 4: Findings and analysis.............................................................................................154.1 Qualitative analysis............................................................................................................15Chapter 5: Conclusion and recommendations..........................................................................175.1 Conclusion..........................................................................................................................175.2 Recommendations..............................................................................................................17Bibliography.............................................................................................................................18
Security Issues in Wireless Protocols_2
2SECURITY ISSUES IN WPA2 Part 2: Research paper reportAbstractWithout the need of a system, minimal effort and auto-oversaw, adaptable as well as lowpower shopper, wireless communication is getting to be plainly developing innovation. Itdemonstrates incredible fastener for present and additionally future hello there techapplications. Expanding dependence on wireless communication additionally conveysincredible difficulties to the safety efforts and other connected issues. In spite of the fact thatthe recently presented rectified security standard, IEEE 802.11i, offers broad security for thewireless condition yet it is as yet untimely and does not give viable measures to shield thewireless systems from privacy and trustworthiness dangers. The objective of this paper is totest the foremost security issues, difficulties and crucial security prerequisites of wirelessinterchanges on the bases of their proposed arrangements.Keywords: WPA2, KRACKs, Key Reinstallation Attacks
Security Issues in Wireless Protocols_3
3SECURITY ISSUES IN WPA2 Chapter 1: Introduction1.1Background of the topicWireless protocols are utilized as a part of numerous applications in society (Bartariya& Rastogi, 2016). On the other hand, security researchers have discovered vulnerability inWi-Fi Protected Access 2. It is one of the types of encryption, which is utilized in order tosecure Wi-Fi networks. The particular network gives unique encryption keys for clientconnected with wireless network. The WPA2 encryption scheme has been broken by leavingconnections of Wi-Fi open for future attackers that could utilize an attack in order to readinformation. It is not believed to secure as it is encrypted. ‘KRACK’ or Key ReinstallationAttack means third parties can eavesdrop on a particular network having privateconversations. It needs to be no longer in some of the circumstances so that private as Wi-Fitraffic passing between computers as well as access points that could be picked up with thehelp of cyber criminals within the range of Wi-Fi potential victim. These limitations make security in wireless protocols a test. In this article we show areview of security issues in wireless protocols (Jing et al. 2014). These issues are groupedinto five classes: cryptography, key administration, secure directing, secure informationaccumulation, and interruption location. It is additionally brought up the open research issuesin each subarea and finish up with conceivable future research bearings on security inwireless protocols. The vulnerability dubbed as KRACKs or Key Reinstallation Attacks,which is considered as a set of several vulnerabilities. In addition, it cloud allow the attackersintercepting as well as stealing data. Digital information over internet includes licensenumber of the devices, social security number and credit card numbers.
Security Issues in Wireless Protocols_4
4SECURITY ISSUES IN WPA2 1.2Research aims and objectivesThe research aims to find out the security issues associated with WPA2. Additionally,the research will critically analyze the issues and based on that recommendations will beprovided to minimize the issues. The research objectives are as followed.To find out the security issues involved with WPA2 To critically analyze the security issues and find out the loop holesTo recommend solutions to overcome the security issues in WPA21.3Research questionsWhat are the security issues involved with WPA2?How to overcome the security issues in WPA2?1.4 Research rationaleAs Wi-Fi Protected Access 2 becomes one of the types of encryption, it is importantto secure that. However, security analysts have found major vulnerability in WPA 2. Thereare several weakness included in the Wi-Fi standard. Thus, users require updating theproducts when security becomes available. On the other hand, it is needed to execute keyreinstallation. Additionally, the major attack is occurred in 4-way handshake of WPA2protocol. It is usually executed while a client joins a protected Wi-Fi network. It is utilized inorder to confirm client as well as access point possess appropriate credentials. Presently,modern protected Wi-Fi networks use the process. Hence, it becomes important to researchon the security issues involved with WPA2.On the other hand, widespread as well as practical impact is considered as one of thekey reinstallation attacks against the type of attack. Moreover, adversaries can utilize theattack for decrypting packets that are sent by the customers. The decryption of packets is
Security Issues in Wireless Protocols_5
5SECURITY ISSUES IN WPA2 possible as the reinstallation attack can cause transmit nonce to be reset in initial value. Thus,it is critical to find the solution for mitigating the issue and leads to research on the same.
Security Issues in Wireless Protocols_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Manipulation of the Handshake Protocol
|3
|1367
|380

Security Aspect of Wi-fi Technology: A Survey Paper Research Paper 2022
|5
|1183
|15

Cybersecurity - Question & Answer
|7
|1819
|40

Emerging Wireless Communication and Network Technologies
|4
|1346
|50

Hacking WPA Networks Using Gerix
|6
|545
|224

Assignment on Network Management in Dell
|5
|593
|56