WPA Exploitation in the World of Wireless Network

Provided by: International Journal of Advanced Research in Computer Engineering & Technology Topic: Mobility Date Added: Jun 2012 Format: PDF
WiFi device uses security authentication protocol even though they are having some weakness. Generally WEP, WPA protocols are used for security purpose. This is already proved that WEP authentication protocol is a weak protocol. By analyzing weakness of WEP the concept of WPA and WPA2 developed. In this paper, the authors will examine the weaknesses of "Strong WPA/WPA2 Authentication" and see how easy it is to crack the protocol. They will take a look at the new standard's WPA and WPA2 implementations along with their first minor vulnerabilities and how it is possible to crack it.

Find By Topic