Int. J. of Information and Computer Security   »   2014 Vol.6, No.1



Title: Exposing WPA2 security protocol vulnerabilities


Authors: Achilleas Tsitroulis; Dimitris Lampoudis; Emmanuel Tsekleves


Brunel University, School of Engineering and Design, Kingston Lane, Uxbridge, UB8 3PH, UK
Department of Information Systems, University of Macedonia (U.O.M.), Greece
Lancaster University, Imagination Lancaster, LICA Building, Bailrigg, Lancaster, LA1 4YW, UK


Abstract: Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.


Keywords: wireless security; 802.11 security; wifi protected access 2; WPA2 vulnerabilities; WPA; privacy; authentication; wireless LANS; local area networks; WLANs; security protocols; network security; malicious attacks.


DOI: 10.1504/IJICS.2014.059797


Int. J. of Information and Computer Security, 2014 Vol.6, No.1, pp.93 - 107


Available online: 10 Mar 2014



Editors Full text accessAccess for SubscribersPurchase this articleComment on this article