DOI QR코드

DOI QR Code

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan (Department of IT Application Technology, Hoseo Graduate School of Venture) ;
  • Park, Dea-Woo (Department of IT Application Technology, Hoseo Graduate School of Venture)
  • Received : 2012.02.10
  • Accepted : 2012.03.21
  • Published : 2012.06.30

Abstract

An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

Keywords

References

  1. H. C. Jung and H Lee, "Study on security reinforcement method by wireless security status survey and analysis," Proceedings of the Korea Information Processing Society Conference, Seoul, Korea, pp. 857-860, 2006.
  2. M. S. Kang and C. S. Hong, " A prevention mechanism against Dos attack using the TKIP in wireless LAN environment," Proceedings of the Korea Computer Congress, Pyeongchang, Korea, pp. 145-147, 2005.
  3. C. G. Park, "Methods of WAP gateway capacity dimensioning and traffic forecasting," Journal of the Korean Institute of Communication Sciences, vol. 35, no. 4, pp. 576-586, 2010.
  4. Wi-Fi protected access 2 [Internet]. Available: http://choidgo.blog.me/54403682
  5. C. K. Hong and Y. J. Jeong, "Design and implementation of IEEE 802.11i MAC layer," Journal of the Korean Institute of Communication Sciences, vol. 34, no. 8, pp. 640-647, 2009.
  6. H. B. Kim and S. J. Lee, "Study on secure unattended defence system implementation using wireless sensor network," Proceedings of the Korean Society for Internet Information, vol. 7, no.2, pp. 177-182, 2006.
  7. S. Lee, J. Kang, H. Moon, M. Lee, and Cl. K. Kim "Per packet authentication scheme using one-bit in 802.11 wireless LAN," The KIPS Transactions : Part C, vol. 12C, no.4, pp. 465-472, 2005. https://doi.org/10.3745/KIPSTC.2005.12C.4.465
  8. W. S. Chun and D. W. Park, "A study of forensic on eavesdropping from VoIP and messenger through WiBro network," Journal of th Korea Society of Computer and Information, vol. 14, no. 5, pp. 149-156, 2009.

Cited by

  1. 스마트 디바이스를 이용한 학생안전 네트워크 서비스 시스템 vol.17, pp.9, 2012, https://doi.org/10.6109/jkiice.2013.17.9.2213