Security access local wireless network with use of free tools

Authors

  • Juan Ballesteros Universidad Santo Tomas, Colombia
  • Fabián Chaparro Universidad Autónoma de Bucaramanga, Colombia

DOI:

https://doi.org/10.21754/tecnia.v26i1.7

Keywords:

wife, wlan, wireless, wpa wep

Abstract

In this paper we present an audit IEEE 802.11x networks to check how secure these networks are for use in the home and office, will be used for this purpose free software Linux with aircrack suite, tests were done for the 2 encryptions WEP and WPA these popular encryptions for security in wireless networks, also show different forms to develop attacks for example denial of service sniffers, fake authentication, etc. The dictionary attack is the most popular and will be the starting point for the audit, but it is important also to mention other equally effective methods to develop this attack. 

Downloads

Download data is not yet available.

References

[1] Baghaei N, Engineering S and Zealand N 2004 Performance Using Multiple Clients IEEE 2004 pp 2–6

[2] Khakurel S, Tiwary P K, Maskey N, Sachdeva G 2010 Security Vulnerabilities in IEEE 802.11 and Adaptive Encryption Technique for Better Performance 2010 IEEE Symposium on Industrial Electronics and Applications pp 207–210

[3] Xiao Y and Bandela C 2005 Vulnerabilities and Security Enhancements for the IEEE Globecom 2005 proceedings pp 1655–1659

[4] GuJ2011Research on WLAN Security Technology Based on IEEE 802 .11 2011 3rd International Conference on Advanced Computer Control (ICACC 2011) pp 234–237

[5] García M and Montalvo X Gestión de una red Lan Inalámbrica usando herramienta propietaria

[6] Ross J The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless

[7] Kipper G Wireless Crime and Forensic Investigation

[8] Wang Y, Zhigang Y and Zhao X Practical defense against WEP and WPA-PSK attack for WLAN

[9] Habibi A and Mansoori M Wired EquivalentPrivacy (WEP) versus WIFI Protected Access (WPA)

[10] Elcom SoftCo.Ltd [Online] http://www.elcomsoft.com/company.html

Published

2016-06-01

How to Cite

[1]
J. Ballesteros and F. Chaparro, “Security access local wireless network with use of free tools”, TEC, vol. 26, no. 1, pp. 57–64, Jun. 2016.

Issue

Section

Articles