Abstract
In the twenty-first century as the technology evolves in a rapid pace, more and more number of users and businesses are getting connected to the Internet. A vast majority of these users use the wireless mode (Wi-Fi) for getting connected to the Internet. As the number of users and the online transactions rises in billions so is the risk of a cyber-fraud, due to the vulnerabilities present in the Wi-Fi protocols (WEP, WPA and WPA2). Security remains a huge challenge as Wi-Fi passwords could be cracked from both home and enterprise-level networks by using the tools and by performing social engineering attacks. Data protection is a huge challenge for computer scientists, and in this work, the investigators have identified the loopholes of Wi-Fi encryption protocols. The identification procedures are tested on a test network with various Wi-Fi encryption protocols in a controlled laboratory setup. Data packets from the wireless networks could be easily sniffed by using aircrack-ng software suite for capturing the handshake and ultimately for cracking the password from huge wordlists. The process of cracking the password could also be speed up by using a Graphics Processing Unit (GPU) which performs set of repetitive tasks in a faster way and helps in extracting passwords. The overall investigation helps investigators to understand the vulnerabilities present in the modern-day Wi-Fi protocols. Hence, it has been proposed the use of RADIUS server model like in an enterprise network and the use of Wi-Max standard of security for better safety measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Moissinac, K., Ramos, D., Rendon, G., Elleithy, A.: Wireless encryption and WPA2 weaknesses. In: 2021 IEEE 11th Annual computing and communication workshop and conference (CCWC) (2021)
Malgaonkar, S., Patil, R., Rai, A., Singh, A.: Research on WiFi security protocols, Int. J. Comput. Appl. (0975–8887), 164(3) (2017)
Yadav, J., Verma, M.: Comparative analysis: Wi-Fi security protocols. Int. J. Eng. Res. Technol. (IJERT), 2(12) (2013)
Khasawneh, M., Kajman, I., Alkhudaidy, R., Althubyani, A.: A survey on Wi-Fi protocols: WPA and WPA2. In: SNDS 2014, CCIS 420, pp. 496–511. © Springer, Berlin, Heidelberg (2014)
https://www.techtarget.com/searchsecurity/definition/encryption
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhattacharjee, S., Senapati, K.K. (2023). Performance Evaluation and Analysis of Wi-Fi Security Protocols. In: Nagar, A.K., Singh Jat, D., Mishra, D.K., Joshi, A. (eds) Intelligent Sustainable Systems. Lecture Notes in Networks and Systems, vol 578. Springer, Singapore. https://doi.org/10.1007/978-981-19-7660-5_29
Download citation
DOI: https://doi.org/10.1007/978-981-19-7660-5_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7659-9
Online ISBN: 978-981-19-7660-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)