Practical Attack on Wi-Fi Protected Access Version 2 Authentication Protocol

Provided by: International Journal of Computer and Communication System Engineering (IJCCSE)
Topic: Security
Format: PDF
Wireless networks provide convenient and low cost mechanism for connecting network devices. They are ideal since they do not require physical connections .They therefore help to overcome the port limitations of the physical hardware. Any device that has radio receiver can detect these wireless signals. This is because a wireless router transmits the signals uniformly in all directions. The ease with which connections can be established forms one of the weaknesses of wireless networks. They are therefore exposed to many attacks as these attacks can be launched from a remote location, unlike in wired networks where one needs physical connections to the network of interest.

Find By Topic