Analysis and Evaluation of Wireless Networks by Implementation of Test Security Keys

There are so many weaknesses found in the Wired Equivalent Privacy (WEP) key usage protocol and even in the improved Wireless Protected Access (WPA) security key generation algorithm that often mixed mode WPA- WPA2 or WPA2 are utilized - as they are considered a more secure way to obtain wireless security generated keys to date. This paper reports on a practical investigation to test the weaknesses of wireless network security keys, recommend more secure keys and provide a solution to increase the security level of the wireless network. Penetration tests are initiated using the Kali Linux operating system with the help of penetration testing tools to hack WPA-WPA2 mixed mode of access and then provide a solution to increase the security of wireless networks. This will greatly reduce the likelihood of the most common network attacks. The findings of the project will benefit users to both under- stand and to learn about possible loopholes within their wireless networks. Furthermore, the finding will also act as a guideline for the domestic Wi-Fi user about different security settings having implications on their Wi-Fi security.

[1]  K. Passerini,et al.  Wireless network security - a discussion from a business perspective , 2005, Symposium, 2005 Wireless Telecommunications.

[2]  Tai-hoon Kim,et al.  Wireless Network Security: Vulnerabilities, Threats and Countermeasures , 2008 .

[3]  Xuling Hu Study on wireless local area network technology , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[4]  Sherali Zeadally,et al.  Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[5]  V. Guyot WEP-based security management in IEEE 802.11 wireless sensor networks , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[6]  Samad S. Kolahi,et al.  Educational institutes: Wireless network standards, security and future , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[7]  H. Shinde,et al.  Wireless security & privacy , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..

[8]  Santosh Biswas,et al.  Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks , 2015, IEEE Communications Letters.

[9]  Y. Challal,et al.  Enhanced WEP: An efficient solution to WEP threats , 2005, Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005..

[10]  Zakaria I. Saleh,et al.  Wireless Networks Security in Jordan: A Field Study , 2013 .

[11]  Martin Novotný,et al.  Lightweight cipher resistivity against brute-force attack: Analysis of PRESENT , 2012, 2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS).

[12]  H.M. El Badawy,et al.  New protocol design for wireless networks security , 2006, 2006 8th International Conference Advanced Communication Technology.

[13]  Thomas M. Siep,et al.  Paving the way for personal area network standards: an overview of the IEEE P802.15 Working Group for Wireless Personal Area Networks , 2000, IEEE Wirel. Commun..

[14]  R.C. Joshi,et al.  A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain , 2007, 2007 International Conference on Signal Processing, Communications and Networking.

[15]  N. Sahu,et al.  Identify Uncertainty of Cyber Crime and Cyber Laws , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[16]  Ismael Ripoll,et al.  Preventing Brute Force Attacks Against Stack Canary Protection on Networking Servers , 2013, 2013 IEEE 12th International Symposium on Network Computing and Applications.

[17]  Jack L. Burbank,et al.  Wireless Networking: Understanding Internetworking Challenges , 2013 .

[18]  Michael Cavanaugh,et al.  CCNA Voice Official Exam Certification Guide , 2008 .

[19]  Arash Habibi Lashkari,et al.  Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA) , 2009, 2009 International Conference on Signal Processing Systems.