Title: Exposing WPA2 security protocol vulnerabilities
Authors: Achilleas Tsitroulis; Dimitris Lampoudis; Emmanuel Tsekleves
Brunel University, School of Engineering and Design, Kingston Lane, Uxbridge, UB8 3PH, UK
Department of Information Systems, University of Macedonia (U.O.M.), Greece
Lancaster University, Imagination Lancaster, LICA Building, Bailrigg, Lancaster, LA1 4YW, UK
Abstract: Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.
Keywords: wireless security; 802.11 security; wifi protected access 2; WPA2 vulnerabilities; WPA; privacy; authentication; wireless LANS; local area networks; WLANs; security protocols; network security; malicious attacks.
Int. J. of Information and Computer Security, 2014 Vol.6, No.1, pp.93 - 107
Available online: 10 Mar 2014