Abstract:
As the critical security flaw of WEP is discovered, concern of researchers is more and more attracted by the scheme of WPA/WPA2 which includes 802.1X, authentication prot...Show MoreMetadata
Abstract:
As the critical security flaw of WEP is discovered, concern of researchers is more and more attracted by the scheme of WPA/WPA2 which includes 802.1X, authentication protocol, and TKIP and CCMP encryption algorithms. In this paper, an overview of WPA/WPA2 is supplied. And then, the vulnerabilities of WPA/WPA2 and current researches in the method of attacking WPA/WPA2 are introduced. In the last part, these researches are analyzed and concluded.
Published in: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM)
Date of Conference: 23-25 September 2010
Date Added to IEEE Xplore: 14 October 2010
ISBN Information: