Wireless Security Analysis Using WarDrive Investigation in Kaohsiung Areas

  • Hanwei HsiaoEmail author
  • Tienhe Chang
  • ChihChe Chang
Conference paper
Part of the Springer Proceedings in Complexity book series (SPCOM)


With the rapid developments in wireless LAN (WLAN), all types of mobile internet applications and the number of its users get the fast growing. This phenomenon is more obvious in metropolitan areas, and the respondent wireless internet security problems are getting worse. This study would like to look into the WLAN security problems in Kaohsiung metropolitan areas using the wardriving technique, and collects the detailed data of WLAN Access Points (WLAN APs), especially including the items of encryption or not, the types of encryption, the Service Set Identifier (SSIDs), and the Received Signal Strength Indicator (RSSI) to show the correlated wireless LAN security issues. These data will be compared to the related ones of others countries for offering the objective comparisons in WLAN security. In this study, we also randomly grabbed 227 wireless WPA/WPA2 encryption packets and analyzed its passwords strength by GPU technique, and the 56.24 % are the simple passwords and easily cracked by malicious behaviors which show that another worthy issue of the WLAN in Kaohsiung metropolitan areas. This study show the data and issues of WLAN security empirically which offers relatively security statistical data for further research and promotes the secure awareness of wireless internet users.


Wireless security Wardrive Passwords Encryption Wireless network 


  1. 1.
    Llamas R, Restivo K, Shirer M (2013) More smartphones were shipped in Q1 2013 than feature phones: An industry first according to IDC. Accessed
  2. 2.
    Bhatia V, Gupta D, Sinha HP (2012) Analysis of dictionary attack on wireless LAN for different nodes. J Inf Syst Commun 3(1):167–169Google Scholar
  3. 3.
    “,” General Stats (2013). Accessed
  4. 4.
    Janić D, Perakovic D, Remenar V (2012) An analysis of wireless network security in the city of Zagreb and the Zagreb and Karlovac counties. In Proceedings of the 7th international scientific conference on ports and waterways-POWA 2012, 2012Google Scholar
  5. 5.
    He C, Mitchell JC (2004) Analysis of the 802. 11i 4-way handshake. In: Proceedings of the 2004 ACM workshop on wireless security wise 04, pp 43–50Google Scholar
  6. 6.
    Luminita D (2012) Wireless LAN security-WPA2-PSK case study. In: 2nd world conference on information technology (WCIT-2011), vol 1, pp. 62–67Google Scholar
  7. 7.
    Gupta A, Kumkar V, Shrawne S, Tiwari A, Tiwari P (2012) Vulnerabilities of wireless security protocols (WEP and WPA2). Int J Adv Res Comput Eng Technol 1(2):34–38Google Scholar
  8. 8.
    Goodspeed T, Bratus S, Melgares R, Smith SW, Speers R (2012) Api-do: tools for exploring the wireless attack surface in smart meters. In: The 45th Hawaii international conference on system sciences, pp 2133–2140Google Scholar
  9. 9.
    Aparicio-Navarro FJ, Kyriakopoulos KG, Parish DJ (2011) An on-line wireless attack detection system using multi-layer data fusion. In: Proceedings of 2011 IEEE international workshop on measurements and networking (M&N), 2011Google Scholar
  10. 10.
    Danesh MMS, Lashkari AH, Samadi B (2009) A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i). In: The 2nd IEEE international conference on computer science and information technology, pp 48–52Google Scholar
  11. 11.
    Ahmed S, Belali MH, Mahmud I, Rahman S, Sakib N (2012) WPA 2 (Wi-Fi protected access 2) security enhancement: analysis and improvement. Glob J Comput Sci Technol 12(6):83–89Google Scholar
  12. 12.
    Jin Z, Liu Y, Wang Y (2010) Survey on security scheme and attacking methods of WPA/WPA2. In: Proceedings of the 6th international conference on wireless communications networking and mobile computing (WiCOM), 2010Google Scholar
  13. 13.
    Ambavkar PS, Patil PU, Meshram BB, Swamy PK (2012) WPA exploitation in the world of wireless network. Int J Adv Res Comput Eng Technol 1(4):609–618Google Scholar
  14. 14.
    Oechslin P (2003) Making a faster cryptanalytic time-memory. In: Proceedings of the 23rd annual international cryptology conference, 2003Google Scholar
  15. 15.
    Muhammed Azhar YM (2010) Wardriving. In: Seminar report at computer science engineering of Cochin University of Science and Technology, 2010Google Scholar
  16. 16.
    Manetic M, Isaca M, Pisa HK (2010) Wardriving Macao 2010Google Scholar
  17. 17.
    Svendsen G (2012) Security state of 802. 11 wireless networks a study of WLANs in five Norwegian cities. Universitas BergensisGoogle Scholar
  18. 18.
    Nisbet A (2012) A table of four cities wireless security growth in New Zealand. In: 2012 international conference on computing, networking and communications (ICNC), 2012, pp 1167–1171Google Scholar
  19. 19.
    Fong K (2012) Capital weekly. Accessed

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department of Information ManagementNational University of KaohsiungKaohsiungTaiwan

Personalised recommendations