Skip to main content

Analysis and Evaluation of Wireless Networks by Implementation of Test Security Keys

  • Conference paper
  • First Online:
Emerging Technologies in Computing (iCETiC 2018)

Abstract

There are so many weaknesses found in the Wired Equivalent Privacy (WEP) key usage protocol and even in the improved Wireless Protected Access (WPA) security key generation algorithm that often mixed mode WPA- WPA2 or WPA2 are utilized - as they are considered a more secure way to obtain wireless security generated keys to date. This paper reports on a practical investigation to test the weaknesses of wireless network security keys, recommend more secure keys and provide a solution to increase the security level of the wireless network. Penetration tests are initiated using the Kali Linux operating system with the help of penetration testing tools to hack WPA-WPA2 mixed mode of access and then provide a solution to increase the security of wireless networks. This will greatly reduce the likelihood of the most common network attacks. The findings of the project will benefit users to both under- stand and to learn about possible loopholes within their wireless networks. Furthermore, the finding will also act as a guideline for the domestic Wi-Fi user about different security settings having implications on their Wi-Fi security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gon. An introduction to 802.11(WI-FI) technologies (2015). http://www.4gon.co.uk/solutions/introduction_to_802_11_wifi.php. Accessed 18 Nov 2015

  2. Agarwal, M., Biswas, S., Nandi, S.: Advanced stealth man-in-the-middle attack in WPA2 encrypted Wi-Fi networks. IEEE Commun. Lett. 19(4), 581–584 (2015)

    Article  Google Scholar 

  3. aircrack-ng: Cafe Latte attack (2010). http://www.aircrack-ng.org/doku.php?id = cafe-latte. Accessed 15 April 2016

  4. aircrack-ng: Introduction (2016). http://www.aircrack-ng.org/doku.php?id = Main&DokuWiki = g339gdvjfup8lor0t66mv4ie63. Accessed 29 Apr 2016

  5. Vijay, B.P., Pranit, S.T., Swapnil, D.D.: Protecting Wi-Fi networks from rogue access points. In: 4th International Conference on Advances in Recent Technologies in, Bangalore, India, 2012, pp. 119–122 (2012)

    Google Scholar 

  6. Beal, V.: WI-FI (2015). http://www.webopedia.com/TERM/W/Wi_Fi.html. Accessed 26 Nov 2015

  7. Beaver, K.: Straightening Out the Hacker’s Terminology (2016). http://www.dummies.com/how-to/content/straightening-out-the-hackers-terminology.html. Accessed 22 Jan 2016

  8. Burbank, J.L., Andrusenko, J., Everett, J.S.: Wireless Networking Understand- ing Internetworking Challenges. Wiley, New Jersey (2013)

    Book  Google Scholar 

  9. Choi, M.K., Robles, R.J., Hong., C.-H., Kim, T.-H.: Wireless network security: vulnerabilities, threats and countermeasures. Int. J. Multimedia Ubiquit. Eng. 3(3) (2008). https://www.researchgate.net/publication/228864040_Wireless_Network_Security_Vulnerabilities_Threats_and_Countermeasures. Accessed 25 Apr 2016

  10. Cioara., J.D., Cavanagh, M.J., Krake, K.A.: CCNA Voice Official Exam Certification Guide. Cisco Press, USA (2008)

    Google Scholar 

  11. Cities-Lyon. Wireless metropolitan area networks (Wi-MAN). http://www.cities.lyon.fr/en/wi-man.html. Accessed 19 Jan 2016

  12. cmu95752: Wardriving: Legal or Illegal? (2012). https://cmu95752.wordpress.com/2011/12/12/wardriving-legal-or-illegal/. Accessed 28 Apr 2016

  13. Dazzlepod: wordlist (2016). http://dazzlepod.com/site_media/txt/passwords.txt. Accessed 1 May 2016

  14. Encarnacion, L.: How To Hack WPA/WPA2 Wi-Fi With Kali Linux & Aircrack-ng (2016). http://lewiscomputerhowto.blogspot.co.uk/2014/06/how-to-hack-wpawpa2-wi-fi-with-kali.html. Accessed 30 Apr 2016

  15. Fowler, S., Zeadally, S.: Defending against Distributed Denial of Service (DDoS) attacks with queue traffic differentiation over Micro-MPLS-based wireless networks. In: International Conference on Systems and Networks Communications, ICSNC 2006, p. 8, October 2006

    Google Scholar 

  16. Guyot, V.: WEP-based security management in IEEE 802.11 wireless sensor networks. In: 3rd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2007, 26–28 September 2007, pp. 1–4 (2007)

    Google Scholar 

  17. Hassan, H.R., Challal, Y.: “Enhanced WEP: an efficient solution to WEP threats. In: 2nd IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2005, 6–8 March 2005, pp. 594–599 (2005)

    Google Scholar 

  18. Ipoint: Wireless Networking (Wi-Fi) – Advantages and Disadvantages to wireless networking (2016). http://ipoint-tech.com/wireless-networking-wi-fi-advantages-and-disadvantages-to-wireless-networking/. Accessed 11 Apr 2016

  19. Kali Linux: What is Kali Linux? (2016). http://docs.kali.org/introduction/what-is-kali-linux. Accessed 28 Apr 2016

  20. Kali Tools: Aircrack-ng Package Description (2014). http://tools.kali.org/wireless-attacks/aircrack-ng. Accessed 30 Apr 2016

  21. Karnik, A., Passerini, K.: Wireless network security - a discussion from a business perspective. In: Wireless Telecommunications Symposium, 28–30 April 2005, pp. 261–267 (2005). https://doi.org/10.1109/wts.2005.1524796

  22. Kaspersky: What is a Trojan Virus? – Definition (2016). https://usa.kaspersky.com/internet-security-center/threats/trojans#.Vyu8W_krKhd. Accessed 19 Apr 2016

  23. Kazmeyer, M.: The Advantages & Disadvantages of Wi-Fi (2016). http://yourbusiness.azcentral.com/advantages-disadvantages-wifi-23878.html. Accessed 30 Mar 2016

  24. Kearns, D.: Wordlist Package (2013). http://git.kali.org/gitweb/?p=packages/wordlists.git;a=summary. Accessed 3 May 2016

  25. Kumar, K., Joshi, R.C., Singh, K.: A distributed approach using entropy to detect DDoS attacks in ISP domain. In: International Conference on Signal Processing, Communications and Networking, ICSCN 2007, 22–24 February 2007, pp. 331–337 (2007)

    Google Scholar 

  26. Lander, S.: Disadvantages or problems for implementing Wi-Fi technology (2016). http://smallbusiness.chron.com/disadvantages-problems-implementing-wifi-technology-61914.html. Accessed 20 Apr 2016

  27. Lashkari, A.H., Mansoor, M., Danesh, A.S.: Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA). In: 2009 International Conference on Signal Processing Systems, 15–17 May 2009, pp. 445–449 (2009)

    Google Scholar 

  28. Borsc, M., Shinde, H.: Wireless security & privacy. In: 2005 IEEE International Conference on Personal Wireless Communications, ICPWC 2005, pp. 424–428 (2005)

    Google Scholar 

  29. Marco-Gisbert, H., Ripoll, I.: Preventing brute force attacks against stack canary protection on networking servers. In: 2013 12th IEEE International Symposium on Network Computing and Applications (NCA), 22–24 August 2013, pp. 243–250 (2013)

    Google Scholar 

  30. Marsh, J.: Linux: Advantages and Disadvantages of Open-Source Technology (2016). Accessed 29 Apr 2016

    Google Scholar 

  31. Mashhour, S.A., Saleh, Z.: Wireless networks security in Jordan: a field study. IEEE J. Sel. Areas Commun. 5(4), 43–52 (2013)

    Google Scholar 

  32. Mckinney, E.: Disadvantages of Wireless Networks (2016). http://www.ehow.com/facts_4809373_disadvantages-wireless-networks.html. Accessed 28 Apr 2016

  33. Microsoft: Wireless networking overview (2005). https://technet.microsoft.com/en-gb/library/cc784756(v=ws.10).aspx. Accessed 20 Jan 2016

  34. Milton, K.: Can Viruses Spread Over Wi-Fi? (2016). http://smallbusiness.chron.com/can-viruses-spread-over-wifi-75136.html. Accessed 3 Apr 2016

  35. Mitcheel, B.: wardriving - war drivin (2016). http://compnetworking.about.com/cs/wireless/g/bldef_wardrive.htm. Accessed 26 Jan 2016

  36. Peer, D.: The Risks of Viruses, Worms and Trojan Horses on Wireless (2016). http://www.ehow.com/info_7869134_risks-worms-trojan-horses-wireless.html. Accessed 17 Apr 2016

  37. Pinola, M.: What is Wi-Fi (2015). http://mobileoffice.about.com/od/glossary/g/wi-fi.htm. Accessed 26 Nov 2015

  38. Poddar, V., Choudhary, H.: A comparative analysis of Wireless Security Protocols (WEP and WPA2). Int. J. AdHoc Netw. Syst. (IJANS). 4(3) (2014). http://airccse.org/journal/ijans/papers/4314ijans01.pdf. Accessed 5 May 2018

  39. Pospisil, J., Novotny, M.: Lightweight cipher resistivity against brute-force attack: Analysis of PRESENT. In: 2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS), 18–20 April 2012, pp. 197–198 (2012)

    Google Scholar 

  40. Practically Networked: How to Track Down Rogue Wireless Access Points (2016). http://www.practicallynetworked.com/support/030306wirelesssecurity.htm. Accessed 26 April 2016

  41. No authors: Security (2018). https://www.wi-fi.org/discover-wi-fi/security. Accessed 5 May 2018

  42. Rohrer, F.: Is Stealing Wireless Wrong? (2007). http://news.bbc.co.uk/1/hi/magazine/6960304.stm. Accessed 27 April 2016

  43. Rosa, L.R., et al.: Analysis of security and penetration tests for wireless networks with backtrack Linux. In: IEEE International Conference on Communications, ICC 2013, pp. 1–6, June 2013

    Google Scholar 

  44. Rouse, M.: Ethical Hacker (2014). http://searchsecurity.techtarget.com/definition/ethical-hacker. Accessed 24 Jan 2016

  45. Rouse, M.: Dictionary Attack (2005). http://searchsecurity.techtarget.com/definition/dictionary-attack. Accessed: 23 Apr 2016

  46. Sahu, B., Sahu, N., Sahu, S.K., Sahu, P.: Identify uncertainty of cyber crime and cyber laws. In: 2013 International Conference on Communication Systems and Network Technologies (CSNT), 6–8 April 2013, pp. 450–452 (2013)

    Google Scholar 

  47. SANS Institute: How to Avoid Ethical and Legal Issues In Wireless Network Discovery. https://www.sans.org/reading-room/whitepapers/wireless/avoid-ethical-legal-issues-wireless-network-discovery-176. Accessed 28 Apr 2016

  48. Sarmiento, O.P., Guerrero, F.B., Argote, D.R.: Basic security measures for IEEE wireless networks. Revista Ingeniería E Investigación, 28(2), 89–96 (2008). http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S0120-56092008000200012#fig3. Accessed 20 Apr 2016

  49. Selim, G.; El Badawy, H.M.; Salam, M.A.: New protocol design for wireless networks security. In: The 8th International Conference Advanced Communication Technology, ICACT 2006, 20–22 February 2006, vol. 1, p. 776 (2006)

    Google Scholar 

  50. Shukla, R., Kolahi, S.S., Freeth, R., Kumar, A.: Educational institutes: wireless network standards, security and future. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), 30 November–2 December 2010, pp. 76–82 (2010)

    Google Scholar 

  51. Siep, T.M., Gifford, I.C., Braley, R.C., Heile, R.F.: Paving the way for personal area net- work standards: an overview of the IEEE P802.15 working group for Wireless Personal Area networks. IEEE Pers. Commun. 7(1), 37–43 (2000)

    Article  Google Scholar 

  52. Stone, D.: The Advantages & Disadvantages of Wi-Fi (2016). http://classroom.synonym.com/advantages-disadvantages-wifi-17344.html. Accessed 29 Mar 2016

  53. TechTerms: Wi-Fi Definition (2014). http://techterms.com/definition/wi-fi. Accessed 27 Nov 2015

  54. The Computer Gal: How to Get a Trojan Horse and How to Fix It (2010). http://www.thecomputergal.com/Programming/VirusAlert/VerizonWireless.html. Accessed 15 Apr 2016

  55. The Economist: A brief history of Wi-Fi (2015). http://www.economist.com/node/2724397. Accessed 18 Nov 2015

  56. Tradi: Darkc0de LST Password Dictionary Shared Files (2016). http://tradownload.com/results/darkc0de-lst-password-dictionary.html. Accessed 1 May 2016

  57. Webopdia: Dictionary Attack (2016). http://www.webopedia.com/TERM/D/dictionary_attack.html. Accessed 22 Apr 2016

  58. Wood, B.: The Evolution of WiFi (2014). http://www.purplewifi.net/history-wifi/. Accessed 18 Nov 2015

  59. Hu, X.: Study on wireless local area network technology. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 21–23 April 2012, pp. 609–612 (2012)

    Google Scholar 

  60. http://res.cloudinary.com/yumyoshojin/image/upload/v1/pdf/cyber-risk-resilience-2017.pdf. Accessed 2 May 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maaruf Ali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rahman, A., Ali, M. (2018). Analysis and Evaluation of Wireless Networks by Implementation of Test Security Keys. In: Miraz, M., Excell, P., Ware, A., Soomro, S., Ali, M. (eds) Emerging Technologies in Computing. iCETiC 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 200. Springer, Cham. https://doi.org/10.1007/978-3-319-95450-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95450-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95449-3

  • Online ISBN: 978-3-319-95450-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics