Universal Journal of Communications and Network Vol. 3(2), pp. 35 - 40
DOI: 10.13189/ujcn.2015.030201
Reprint (PDF) (466Kb)


Practical Attack on Wi-Fi Protected Access Version 2 Authentication Protocol


Vincent N. Omollo 1,*, Ruth K. Chweya 2
1 Jomo Kenyatta University of Agriculture and Technology, Kenya
2 Kisii University, Kenya

ABSTRACT

Wireless networks provide convenient and low cost mechanism for connecting network devices. They are ideal since they do not require physical connections. They therefore help to overcome the port limitations of the physical hardware. Any device that has radio receiver can detect these wireless signals. This is because a wireless router transmits the signals uniformly in all directions. The ease with which connections can be established forms one of the weaknesses of wireless networks. They are therefore exposed to many attacks as these attacks can be launched from a remote location, unlike in wired networks where one needs physical connections to the network of interest. To overcome this challenge, authentication protocols have been developed to deter any illicit access to wireless networks. These protocols include Wired Equivalent Privacy(WEP) and Wi-Fi Protected Access (WPA). Wi-Fi Protected Access version 2 (WPA2) is the later version of WPA. The objective of this research paper was to demonstrate that WPA2 can still be broken, hence compromising on the Confidentiality, Integrity and Availability (CIA) of the data being transmitted in wireless networks. Data Confidentiality, Integrity and availability has been referred to as the CIA triad in this paper. The set up was implemented in Ubuntu 12.04 operating system using Ettercap, File2air, Khexedit, Wireshark and Airodump-ng from Aircrack-ng suite. The results indicated that WPA2 does not actually protect data in transit in wireless networks, and therefore there is need to explore other technologies that can secure wireless networks.

KEYWORDS
WPA2, CIA Triad, Wireless, Security

Cite This Paper in IEEE or APA Citation Styles
(a). IEEE Format:
[1] Vincent N. Omollo , Ruth K. Chweya , "Practical Attack on Wi-Fi Protected Access Version 2 Authentication Protocol," Universal Journal of Communications and Network, Vol. 3, No. 2, pp. 35 - 40, 2015. DOI: 10.13189/ujcn.2015.030201.

(b). APA Format:
Vincent N. Omollo , Ruth K. Chweya (2015). Practical Attack on Wi-Fi Protected Access Version 2 Authentication Protocol. Universal Journal of Communications and Network, 3(2), 35 - 40. DOI: 10.13189/ujcn.2015.030201.