Authors: Achilleas Tsitroulis; Dimitris Lampoudis; Emmanuel Tsekleves
Addresses: Brunel University, School of Engineering and Design, Kingston Lane, Uxbridge, UB8 3PH, UK ' Department of Information Systems, University of Macedonia (U.O.M.), Greece ' Lancaster University, Imagination Lancaster, LICA Building, Bailrigg, Lancaster, LA1 4YW, UK
Abstract: Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.
Keywords: wireless security; 802.11 security; wifi protected access 2; WPA2 vulnerabilities; WPA; privacy; authentication; wireless LANS; local area networks; WLANs; security protocols; network security; malicious attacks.
International Journal of Information and Computer Security, 2014 Vol.6 No.1, pp.93 - 107
Available online: 10 Mar 2014 *Full-text access for editors Access for subscribers Purchase this article Comment on this article