Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 150)

Abstract

The Wi-Fi Protected Access 2 (WPA2) is the most secured and recommended protocol for wireless networks today. WPA2 addressed the vulnerabilities of previous protocols wired equivalent privacy (WEP) and Wi-Fi protected access (WPA). WPA2 implemented block cipher AES to provide stronger encryption but it is still vulnerable to various attacks due to transmission of unencrypted management and control frames and group key sharing among peers connected to wireless network. With the rapid popularity of wireless networks, secure transmission of data is extremely essential. The solution for WPA2 shortcomings has been proposed and implemented in this paper and thus, provides protection to wireless networks from several attacks.

Keywords

Advanced encryption standard (AES) Extensible authentication protocol (EAP) Robust security network (RSN) Wi-Fi protected access 2 (WPA2) 

References

  1. 1.
  2. 2.
    Arana P (2006) Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2), INFS 612-Fall 2006Google Scholar
  3. 3.
    Gast MS (2005) 802.11 Wireless networks: the definitive guide, 2nd edn. O’Reilly Media, Inc. ISBN:978-0-596-10052-0Google Scholar
  4. 4.
  5. 5.
    Sukhija S, Gupta S (2011) Wireless network security protocols: a comparative study. Int J Emerg Technol Adv Eng, 2(1), ISSN:2250–2459Google Scholar
  6. 6.
    WPA2 Hole196 vulnerability: exploits and remediation strategies. A whitepaper by AirTight Networks, Inc., www.airtightnetworks.com

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAmity UniversityNoidaIndia

Personalised recommendations