• Title/Summary/Keyword: Wi-Fi protected access 2

Search Result 5, Processing Time 0.021 seconds

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

A Study on Vulnerability Analysis and Security Plan through Public WiFi Attack (공공 와이파이 공격을 통한 취약점 분석 및 보안방안에 관한 연구)

  • Cho, Young-nam;Jo, Jeong-won;Jeong, Chae-eun;Kang, Da-seul;Jang, Won-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.493-496
    • /
    • 2018
  • Wi-Fi Protected Access2 (WPA2), a recommended Wi-Fi communication security technology, vulnerabilities are found and Users' personal information may also be exposed. In this paper, we analyze security vulnerabilities of public Wi-Fi by attack and seek to find ways to securely use Wi - Fi by users.

  • PDF

Application of smartphone and wi-fi communication for remote monitoring and control of protected crop production environment (스마트폰과 Wi-Fi통신을 이용한 시설재배지 환경 원격 모니터링 및 제어)

  • Hur, Seung-Oh;Han, Kyeong-Hwa;Jeon, Sang-Ho;Jang, Yong-Sun;Kang, Sin-Woo;Chung, Sun-Ok;Kim, Hak-Jin;Lee, Kyeong-Hwan
    • Korean Journal of Agricultural Science
    • /
    • v.38 no.4
    • /
    • pp.753-759
    • /
    • 2011
  • Protected crop production has been popular in Korea as well as in other countries. Intensive and continuous monitoring and control of the environment, which is labor- and time-consuming, is critical for stable crop productivity and profitability, otherwise damage could be happened due to unfavorable ambient and soil conditions. In the study, potential utilization of smartphone and remote access application in protected crop production environment was investigated. Tested available remote access applications provided functions of mouse click (left and right buttons), zooming in and out, and screen size and color resolution control. Wi-Fi data communication speeds were affected by signal intensity and user place. Data speeds at high (> -55 dBm), medium (-70~-56 dBm), and low (< -71 dBm) signal intensity levels were statistically different (${\alpha}=0.05$). Means of data communication speed were 6.642, 4.923, and 2.906 Mbps at hot spot, home, and office, respectively, and the differences were significant at a 0.05 level. Smart phone and remote access application were applied successfully to remote monitoring (inside temperature and humidity, and outside precipitation, temperature, and humidity) and control (window and light on/off) of green house environment. Response times for monitoring and control were less than 1 s at all places for high signal intensity (> -55 dBm), but they were increased to 1 ~ 10 s at home and office and to 10 ~ 30 s at hot spot for low signal intensity (< -71 dBm) for Wi-Fi. Results of the study would provide useful information for farmers to apply these techniques for their crop production.

Implementation of P2P Standard Group Formation in WiFi Direct for Direct Communication Services between Internet-of-Things Gateways (사물인터넷 게이트웨이 간의 직접통신 서비스를 제공하기 위한 와이파이 다이렉트 P2P Standard Group Formation 구현)

  • Park, Yungi;Han, Kwonhee;Seo, Jeongwook;Kim, Hyunsik;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.436-438
    • /
    • 2015
  • In this paper, a P2P Standard Group Formation (P2P-SGF) method in Wi-Fi Direct is presented to provide direct communication services between Internet-of-Things (IoT) gateways. Generally, network traffic congestion and speed reduction problems are caused when transmitting mass data as well as measured data from many sensors between IoT gateways via an Access Point (AP). For solving these problems, it is required to implement Wi-Fi Direct efficiently transmitting mass data between IoT gateways without passing through the AP. The implemented P2P-SGF method basically performs Discovery, GO (Group Owner) Negotiation, WPS (Wi-Fi Protected Setup) Provisioning, and Address Configuration. Especially, it supports the DLNA (Digital Living Network Alliance) service function for sharing mass data between IoT gateways. Some experimental results verify that it can successfully share large video files.

  • PDF

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.