Loading [MathJax]/extensions/MathMenu.js
Survey on Security Scheme and Attacking Methods of WPA/WPA2 | IEEE Conference Publication | IEEE Xplore

Survey on Security Scheme and Attacking Methods of WPA/WPA2


Abstract:

As the critical security flaw of WEP is discovered, concern of researchers is more and more attracted by the scheme of WPA/WPA2 which includes 802.1X, authentication prot...Show More

Abstract:

As the critical security flaw of WEP is discovered, concern of researchers is more and more attracted by the scheme of WPA/WPA2 which includes 802.1X, authentication protocol, and TKIP and CCMP encryption algorithms. In this paper, an overview of WPA/WPA2 is supplied. And then, the vulnerabilities of WPA/WPA2 and current researches in the method of attacking WPA/WPA2 are introduced. In the last part, these researches are analyzed and concluded.
Date of Conference: 23-25 September 2010
Date Added to IEEE Xplore: 14 October 2010
ISBN Information:

ISSN Information:

Conference Location: Chengdu, China

Contact IEEE to Subscribe

References

References is not available for this document.