Information System for Connection to the Access Point with Encryption WPA2 Enterprise

This work is to create an information system that would provide a connection to the access point with encryption WPA2 Enterprise. The practical value of the results obtained is to develop a more secure and perfect information system for working with a wireless access point. The introduction of this technology makes it possible to avoid data theft and speed up the Internet connection. Basically, it is aimed at the activity of private enterprises, but it can find its application and in scientific activity in the future. The developed information system is used by Point Dume Limited, which has already developed an analytical information system for mobile platforms. This information system is used in more than 100,000 access points in Japan, Hong Kong, the United Kingdom and the United States.

[1]  Petro Kravets,et al.  The control agent with fuzzy logic , 2010, 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design.

[2]  Emmanuel Tsekleves,et al.  Exposing WPA2 security protocol vulnerabilities , 2014, Int. J. Inf. Comput. Secur..

[3]  Vasyl Lytvyn,et al.  Designing architecture of electronic content commerce system , 2015, 2015 Xth International Scientific and Technical Conference "Computer Sciences and Information Technologies" (CSIT).

[4]  Lyubomyr Chyrun,et al.  Intellectual system design for content formation , 2017, 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).

[5]  Jiang Li,et al.  Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[6]  Mohammed Mahmudur Rahman,et al.  A comparative study of WLAN security protocols: WPA, WPA2 , 2015, 2015 International Conference on Advances in Electrical Engineering (ICAEE).

[7]  Natalia Grabar,et al.  COLINS 2018 (Computational Linguistics and Intelligent Systems) , 2018 .

[8]  Arash Habibi Lashkari,et al.  A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[9]  Victoria Vysotska,et al.  Process analysis in electronic content commerce system , 2015, 2015 Xth International Scientific and Technical Conference "Computer Sciences and Information Technologies" (CSIT).

[10]  Roel Verdult,et al.  Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers , 2015, WOOT.

[11]  B. Vijayakumar,et al.  Cyber Security Scenarios and Control for Small and Medium Enterprises , 2012 .

[12]  Marianne A. Azer,et al.  A study in WPA2 enterprise recent attacks , 2017, 2017 13th International Computer Engineering Conference (ICENCO).

[13]  Jerry Fjermestad,et al.  Mobile and Connected Device Security Considerations: A Dilemma for Small and Medium Enterprise Business Mobility? , 2012, AMCIS.

[14]  Sorin Andrei VISAN WPA/WPA2 Password Security Testing using Graphics Processing Units , 2013 .

[15]  Victoria Vysotska,et al.  The Method of Web-Resources Management Under Conditions of Uncertainty Based on Fuzzy Logic , 2018, 2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).

[16]  Vasyl Lytvyn,et al.  Development of the System to Integrate and Generate Content Considering the Cryptocurrent Needs of Users , 2019 .

[17]  Victoria Vysotska,et al.  Model and Architecture for Virtual Library Information System , 2018, 2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).

[18]  Tamara Radivilova,et al.  Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise , 2017, 2017 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo).

[19]  Bogdan Crainicu Wireless LAN Security Mechanisms at the Enterprise and Home Level , 2008 .

[20]  Mark A. Harris,et al.  Mobile device security considerations for small- and medium-sized enterprise business mobility , 2014, Inf. Manag. Comput. Secur..

[21]  Frank Piessens,et al.  Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.

[22]  Wim Lamotte,et al.  Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles , 2014, WiSec '14.

[23]  Victoria Vysotska,et al.  Web Resources Management Method Based on Intelligent Technologies , 2018 .

[24]  Arif Sari,et al.  Comparative Analysis of Wireless Security Protocols: WEP vs WPA , 2015 .

[25]  Yevhen Burov,et al.  Method for Ontology Content and Structure Optimization, Provided by a Weighted Conceptual Graph , 2018, Webology.

[26]  Eric Medvet,et al.  Evil twins and WPA2 Enterprise: A coming security disaster? , 2018, Comput. Secur..

[27]  Vasyl Lytvyn,et al.  The Virtual Library System Design and Development , 2018 .

[28]  Paul Arana,et al.  Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2) , 2006 .

[29]  Anja Feldmann,et al.  Towards programmable enterprise WLANS with Odin , 2012, HotSDN '12.

[30]  Vasyl Lytvyn,et al.  Architecture of System for Content Integration and Formation Based on Cryptographic Consumer Needs , 2018, 2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).