Abstract
With the popularization of mobile phones and Wi-Fi hotspots, the diversification of wireless communication applications has rapidly growing. Wi-Fi Protected Access (WPA), offered by network user authentication and communication encryption, is the most generally used mechanism to protect users in wireless networks. This paper has discussed the weakness of 4-way handshake procedure in Wi-Fi Protected Access 2/Pre-Shared Key (WPA2/PSK) and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking using Kali Linux tool and the result is given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Reddy, S.V., Rijutha, K., SaiRamani, K., Ali, S.M, Reddy, C.P.: Wireless hacking - a WiFi hack by cracking WEP. In: 2nd International Conference on Education Technology and Computer (2010)
Cui, K., Yin, D.: Research on the security of the encrypted WLAN. In: International Conference on Computer Science and Service System (CSSS) (2011)
Alqahtani, S.A., Aloraini, M.: Resolving wireless security limitations using a new Wi-Fi secure access. In: IEEE 12th International Conference on Computer and Information Technology (2012)
Zhang, L., Yu, J., Deng, Z., Zhang, R.: The security analysis of WPA encryption in wireless network. In: 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet) (2012)
Pandurang, R.M., Karia, D.C.: Performance measurement of WEP and WPA2 on WLAN using OpenVPN. In: International Conference on Nascent Technologies in the Engineering Field (ICNTE) (2015)
Yacchirena, A., Alulema, D., Aguilar, D. Morocho, D., Encalada, F, Granizo, E.: Analysis of attack and protection systems in Wi-Fi wireless networks under the Linux operating system. In: IEEE International Conference on Automatica (ICA-ACCA) (2016)
Radivilova, T., Hassan, H.A.: Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-enterprise. In: International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo) (2017)
Abo-Soliman, M.A., Azer, M.A.: A study in WPA2 enterprise recent attacks. In: 13th International Computer Engineering Conference (ICENCO) (2017)
Chang, T.-H., Lin, J.-W., Lai, G.H.: The method of capturing the encrypted password packets of WPA and WPA2, automatic, semi-automatic or manual? In: IEEE Conference on Dependable and Secure Computing (DSC) (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, CL., Punya, S. (2020). Enhanced WPA2/PSK for Preventing Authentication Cracking. In: Li, W., Tang, D. (eds) Mobile Wireless Middleware, Operating Systems and Applications. MOBILWARE 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 331. Springer, Cham. https://doi.org/10.1007/978-3-030-62205-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-62205-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62204-6
Online ISBN: 978-3-030-62205-3
eBook Packages: Computer ScienceComputer Science (R0)