Skip to main content

Information System for Connection to the Access Point with Encryption WPA2 Enterprise

  • Conference paper
  • First Online:
Book cover Lecture Notes in Computational Intelligence and Decision Making (ISDMCI 2019)

Abstract

This work is to create an information system that would provide a connection to the access point with encryption WPA2 Enterprise. The practical value of the results obtained is to develop a more secure and perfect information system for working with a wireless access point. The introduction of this technology makes it possible to avoid data theft and speed up the Internet connection. Basically, it is aimed at the activity of private enterprises, but it can find its application and in scientific activity in the future. The developed information system is used by Point Dume Limited, which has already developed an analytical information system for mobile platforms. This information system is used in more than 100,000 access points in Japan, Hong Kong, the United Kingdom and the United States.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Harris M et al (2012) Mobile and connected device security considerations: a dilemma for small and medium enterprise business mobility?

    Google Scholar 

  2. Trudeau P, Laroche S (2014) U.S. Patent No. 8,885,539. U.S. Patent and Trademark Office, Washington, DC

    Google Scholar 

  3. Sari A, Karay M (2015) Comparative analysis of wireless security protocols: WEP vs WPA. Inter J Commun Netw Syst Sci 8(12):483

    Google Scholar 

  4. Tsitroulis A, Lampoudis D, Tsekleves E (2014) Exposing WPA2 security protocol vulnerabilities. IJICS 6(1):93–107

    Article  Google Scholar 

  5. Vanhoef M, Piessens F (2017) Key reinstallation attacks: forcing nonce reuse in WPA2. In: SIGSAC conference on computer and communications security, pp 1313–1328

    Google Scholar 

  6. Li J, Garuba M (2008) Encryption as an effective tool in reducing wireless LAN vulnerabilities. In: International conference on information technology: new generations, pp 557–562

    Google Scholar 

  7. Rumale AS, Chaudhari D (2011) IEEE 802.11 x, and WEP, EAP, WPA/WPA2. Tech Appl 2(6):1945–1950

    Google Scholar 

  8. Arana P (2006) Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2). INFS 612:1–6

    Google Scholar 

  9. Lashkari AH, Danesh MMS, Samadi, B (2009) A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i). In: International conference on computer science and information technology, pp 48–52

    Google Scholar 

  10. Suresh L, Schulz-Zander J, Merz R, Feldmann A, Vazao T (2012) Towards programmable enterprise WLANS with Odin. In: Proceedings of the first workshop on hot topics in software defined networks, pp 115–120

    Google Scholar 

  11. Khasawneh M, Kajman I, Alkhudaidy R, Althubyani A (2014) A survey on Wi-Fi protocols: WPA and WPA2. In: International conference on security in computer networks and distributed systems. Springer, Heidelberg, pp 496–511

    Google Scholar 

  12. Robyns P, Bonné B, Quax P, Lamotte W (2014) Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles. In: ACM conference on security and privacy in wireless & mobile networks, pp 189–194

    Google Scholar 

  13. Vanhoef M, Piessens F (2017) Key reinstallation attacks: forcing nonce reuse in WPA2. In: ACM SIGSAC conference on computer and communications security, pp 1313–1328

    Google Scholar 

  14. Nussel L. (2010) The evil twin problem with WPA2-enterprise. SUSE Linux Products GmbH

    Google Scholar 

  15. Katz FH (2010) WPA vs. WPA2: is WPA2 really an improvement on WPA? In: Annual computer security conference, Coastal Carolina University, Myrtle Beach, SC

    Google Scholar 

  16. Harris AM, Patten PK (2014) Mobile device security considerations for small-and medium-sized enterprise business mobility. Inf Manag Comput Secur 22(1):97–114

    Article  Google Scholar 

  17. Crainicu B (2008) Wireless LAN security mechanisms at the enterprise and home level. In: Novel algorithms and techniques in telecommunications, automation and industrial electronics. Springer, Dordrecht, pp 306–310

    Google Scholar 

  18. Abo-Soliman MA, Azer MA (2017) A study in WPA2 enterprise recent attacks. In: International computer engineering conference (ICENCO), pp 323–330

    Google Scholar 

  19. Radivilova T, Hassan HA (2017) Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-enterprise. In: International conference on information and telecommunication technologies and radio electronics (UkrMiCo), pp 1–4

    Google Scholar 

  20. Lorente EN, Meijer C, Verdult R (2015) Scrutinizing WPA2 password generating algorithms in wireless routers. In: USENIX workshop on offensive technologies

    Google Scholar 

  21. Visan SA (2013) WPA/WPA2 password security testing using graphics processing units. J Mob Embed Distrib Syst 5(4):167–174

    Google Scholar 

  22. Sangani NK, Vijayakumar B (2012) Cyber security scenarios and control for small and medium enterprises. Informatica Economica 6(2):58

    Google Scholar 

  23. Bartoli A, Medvet E, Onesti F (2018) Evil twins and WPA2 Enterprise: a coming security disaster? Comput Secur 4:1–11

    Article  Google Scholar 

  24. Gali TAB, Amin Babiker A, Mustafa N (2015) A comparative study between WEP, WPA and WPA2 security algorithms. Int J Sci Res. ISSN 2319-7064

    Google Scholar 

  25. Adnan AH, Abdirazak M, Sadi AS, Anam T, Khan SZ, Rahman MM, Omar MM (2015) A comparative study of WLAN security protocols: WPA, WPA2. In: International conference on advances in electrical engineering (ICAEE), pp 165–169

    Google Scholar 

  26. Nandi S (2019) Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity. In: Distributed computing and internet technology: international conference, ICDCIT 2019, Bhubaneswar, India, vol 11319. Springer, p 422

    Google Scholar 

  27. Vysotska V, Fernandes VB, Emmerich M (2018) Web content support method in electronic business systems. In: CEUR workshop proceedings, vol 2136, pp 20–41

    Google Scholar 

  28. Vysotska V, Hasko R, Kuchkovskiy V (2015) Process analysis in electronic content commerce system. In: Proceedings of the international conference on computer sciences and information technologies, CSIT 2015, pp 120–123

    Google Scholar 

  29. Naum O, Chyrun L, Kanishcheva O, Vysotska V (2017) Intellectual system design for content formation. In: Proceedings of the international conference on CSIT computer science and information technologies, pp 131–138

    Google Scholar 

  30. Lytvyn V, Sharonova N, Hamon T, Vysotska V, Grabar N, Kowalska-Styczen A (2018) Computational linguistics and intelligent systems. In: CEUR workshop proceedings, vol 2136

    Google Scholar 

  31. Lytvyn V, Vysotska V (2015) Designing architecture of electronic content commerce system. In: Proceedings of the X-th international conference on computer science and information technologies, CSIT 2015, pp 115–119

    Google Scholar 

  32. Gozhyj A, Vysotska V, Yevseyeva I, Kalinina I, Gozhyj V (2019) Web resources management method based on intelligent technologies. Adv Intell Syst Comput 871:206–221

    Google Scholar 

  33. Gozhyj A, Kalinina I, Vysotska V, Gozhyj V (2018) The method of web-resources management under conditions of uncertainty based on fuzzy logic. In: 2018 IEEE 13th international Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 – Proceedings, vol 1, pp 343–346

    Google Scholar 

  34. Lytvyn V, Vysotska V, Dosyn D, Burov Y (2018) Method for ontology content and structure optimization, provided by a weighted conceptual graph. Webology 15:66–85

    Google Scholar 

  35. Kravets P (2010) The control agent with fuzzy logic. In: Perspective technologies and methods in MEMS design, MEMSTECH 2010, pp 40–41

    Google Scholar 

  36. Lytvyn V, Vysotska V, Kuchkovskiy V, Bobyk I, Malanchuk O, Ryshkovets Y, Pelekh I, Brodyak O, Bobrivetc V, Panasyuk V (2019) Development of the system to integrate and generate content considering the cryptocurrent needs of users. East-Eur J Enterp Technol 1(2–97):18–39

    Article  Google Scholar 

  37. Lytvyn V, Kuchkovskiy V, Vysotska V, Markiv O, Pabyrivskyy V (2018) Architecture of system for content integration and formation based on cryptographic consumer needs. In: 2018 IEEE 13th international scientific and technical conference on computer sciences and information technologies, CSIT 2018 – Proceedings, vol 1, pp 391–395

    Google Scholar 

  38. Rusyn B, Lytvyn V, Vysotska V, Emmerich M, Pohreliuk L (2019) The virtual library system design and development. Adv Intell Syst Comput 871:328–349

    Google Scholar 

  39. Rusyn B, Vysotska V, Pohreliuk L (2018) Model and architecture for virtual library information system. In: International scientific and technical conference on computer sciences and information technologies, CSIT 2018 – Proceedings, vol 1, pp 37–41

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lyubomyr Chyrun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chyrun, L., Chyrun, L., Kis, Y., Rybak, L. (2020). Information System for Connection to the Access Point with Encryption WPA2 Enterprise. In: Lytvynenko, V., Babichev, S., Wójcik, W., Vynokurova, O., Vyshemyrskaya, S., Radetskaya, S. (eds) Lecture Notes in Computational Intelligence and Decision Making. ISDMCI 2019. Advances in Intelligent Systems and Computing, vol 1020. Springer, Cham. https://doi.org/10.1007/978-3-030-26474-1_28

Download citation

Publish with us

Policies and ethics