0% found this document useful (0 votes)
20 views

Common Security Protocols For Wireless N

WiFi protect

Uploaded by

sashx30
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Common Security Protocols For Wireless N

WiFi protect

Uploaded by

sashx30
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Atlantis Highlights in Computer Sciences, volume 4

Proceedings of the 3rd International Conference on Integrated Intelligent Computing


Communication & Security (ICIIC 2021)

Common Security Protocols for Wireless Networks: A


Comparative Analysis
Muhammad Ehsan Rana1,*, Mohamed Abdulla2 and Kuruvikulam Chandrasekaran
Arun3
1,2,3
Asia Pacific University of Technology & Innovation, 57000, Bukit Jalil, Kuala Lumpur, Malaysia
*
Corresponding author. Email: [email protected]

ABSTRACT
In computer networks, security is one of the most important aspects of protecting the network from various attacks.
Especially in wireless networks, security can prevent unauthorized data access and save systems from potential threats.
The security protocols in the wireless networks help to achieve the security process. Many protocols are designed to
accomplish wireless security, which includes Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and
WiFi Protected Access 2 (WPA2). This research paper discusses on the prominent wireless security protocols, that is,
Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access (WPA2) by providing a
comparative analysis in terms of strengths and weaknesses of each protocol. In addition to that, the paper assesses each
protocol in terms of authentication and encryption mechanisms and recommends the best wireless security protocol for
a corporate network, which helps the network from unauthorized attacks.

Keywords: Wireless Security Protocols, Wired Equivalent Protocol (WEP), WiFi Protected Access (WPA),
WiFi Protected Access 2 (WPA2).

On the other hand, a single access point will facilitate


1. INTRODUCTION
all the wireless nodes to communicate and share the data
The wireless network is the most common type of and resources. This type of network will be suitable for
network in which computers and network equipment are small and medium-size business as they do not need
connected without using cables for exchanging enormous effort to set up the entire network using wired
information. The wireless network uses high-frequency media. Wireless networks are highly exposed to security
radio waves to connect deceives, 2.4 GHz and 5GHz are threats, as the data is broadcast using a wireless medium.
the two prominent frequency bands used in the 802.11 Both internal and external threats are more in the wireless
Wireless LAN. This type of network will be the best network, as anyone who breaks the wireless security will
networking solution for small firms. be able to access the network. Rogue Access Point is one
of the common security threats to this type of network.
The core component of the wireless network are This access point is not legitimate, allowing others
routers, access points, and wireless-based computers. (outside of the business) to access the business resources
Unlike the wired network, the wireless network will be without authorization from the network administrator.
able to provide networking services to nearby devices, as This type of access point is mostly set for sharing Internet
the wireless network range is limited compared to the services with nearby people without the knowledge of
wired network. Wireless networks are classified into ad- network administrators. Denial of Service is also one of
hoc and infrastructure-based networks. All the wireless the common security threats to wireless networks. A
nodes are connected to an Access point or centralized unit large number of requests are sent to the access point at
in Ad-hock or peer-to-peer network. All the once, which will slow down or stop the service of the
computers/nodes will be able to communicate directly network equipment [32-35] [40-43]. This paper focuses
and share the data. However, in order to communicate on the security protocols of wireless networks, describing
efficiently, the number of nodes should be limited [36- the security protocols and the effectiveness of these
39]. protocols.

Copyright © 2021 The Authors. Published by Atlantis Press International B.V.


This is an open access article distributed under the CC BY-NC 4.0 license -http://creativecommons.org/licenses/by-nc/4.0/. 632
Atlantis Highlights in Computer Sciences, volume 4

2. SECURITY PROTOCOLS By scanning the wireless signals, the wireless


computer/nodes will be able to find the wireless access
In this section, researchers have discussed the point by identifying the SSID of the wireless access
common security protocols. i.e. WEP, WPA and WPA2 point. The SSID is the broadcast name of the access
for wireless networks. point. At first, the wireless computer/node will send an
authentication request following that the access point will
2.1 WEP (Wired Equivalent Protocol) send a random 128-bit text to the wireless device.

WEP (Wired Equivalent Protocol) is a wireless The wireless device will encrypt the random text by
security protocol introduced and ratified by the IEEE. using a pre-configured key on the device. The encrypted
Both IEEE 802.11 and IEEE 802.11i standards contain a text will be sent to the access point. Then the access point
description of this protocol, while IEEE 802.11i will decrypt the text, using its pre-configured. It will
introduced a more advanced security mechanism to this compare the original text and the decrypted text, and if it
protocol with the help of existing security measures [1]. matches, access will be granted to the witless device.
The core reason for introducing this protocol is to provide Then the access point will send permission granted replay
encryption for data broadcast by the networking devices message to the wireless device [6], [7].
[2].
2.1.3. Encryption - Rivest Cipher 4
2.1.1. History
The encryption algorithm used in this protocol is RC4
Ron Rivest first developed this protocol in the year (Rivest Cipher 4) stream cipher. According to [2], this is
1987. However, it was implemented in 1997 by IEEE and a stream cipher cryptographic engine that enables
labelled as IEEE 802.11 protocol [3]. Until 2005, this encrypting the network traffic. Stream cipher RC4 was
protocol was the most widely used protocol for used to achieve the confidentiality of the data packets,
businesses and individuals. Most of the networking while the CRC-32 checksum is used for the integrity of
components have a default configuration with this the data [3]. Using these two encryption algorithms, data
protocol. Since 2001, several weaknesses were identified is well protected during transmission. Due to the
in this protocol by cryptanalysts, which introduced a new advancement of the technologies, the encryption
protocol to provide security with the wireless network algorithm used in this protocol provides a lack of security
[4]. to the network and the data. In order to overcome this
problem, the Temporal Key Integrity Protocol was
In 2005, the FBI demonstrated the weakness of this introduced, which provides a wrapper to the WEP
protocol by cracking the encrypted key in less than 3 protocol.
minutes [2], [5]. After that, IEEE has declared that WEP
is an obsolete protocol and WPA and WPA2 gets more 2.1.4. Key
popular in wireless security. As for the safety of the users,
most of the devices will show a warning message when According to [1], a single key is shared between all
the user tries to use this protocol’s service. However, this the networking devices, which is referred to as Root Key
protocol is still in use, where security is not a significant (Rk). In most cases, a single key will be used. However,
concern. in exceptional cases, more than four keys will be used.
40-bit keys are used in the standard version of this
2.1.2. Authentication protocol. The advanced version uses a 104-bit key, while
some vendors implement this protocol in their devices
According to [6], IEEE 802.11 defines Open System having a 232-bit key to strengthen the encryption.
and Shared Key WEP authentication. In open system
authentication, the network will not have any security 2.1.5. Strengths
mechanism to prevent unauthorized access. In other
words, anyone will be able to join the network without It is a well-known fact that the impact of security
restrictions. Figure 1 shows WEP authentication process. protocol for transmitting the data over the wireless
network is tremendous. Attackers have to make some
effort in order to break the encryption of WEP. Not every
user will be able to hack the wireless network and access
the resource to the data will be protected to a certain level.

2.1.6. Weaknesses

Figure 1 WEP Authentication [7]. There is a high degree of data manipulation and data
loss in WEP as a shared key can be easily decoded by
capturing the data. The integrity of the data cannot be

633
Atlantis Highlights in Computer Sciences, volume 4

guaranteed. In addition to that, key management is also association established to carry out research work related
an issue, as it does not maintain a proper key table leading to network securities. The flaws in WEP protocol resulted
to use the same key for a more extended period [8]. Poor in introducing a new protocol by Alliance in 2003 [12].
key management exposed to a high threat to WEP In 2004, WEP protocol was declared an outdated security
networks. Apart from the key management, the size of protocol for wireless networks, and it was replaced by
the key is small, which provides a lack of security to the WPA, which is more reliable and has a more robust
data packets. The 40-bit key is not enough to provide algorithm. So the significant change in this protocol is a
adequate security to the network [9]. The small size key message integrity check to verify the data packets
opens the WEP networks for the attackers to implement between the client and the wireless access point [13].
brute force attack.
Moreover, the same initialization vector is being used
2.2.2. Authentication
in this protocol, enabling the attacker to decrypt without Different authentication process is used for two
using the encryption key. The challenge-response versions of WPA protocol. For WPA Personal, PSK
scheme used in a shared key is a significant issue in the authentication has been used. On the other hand, EAP
authentication process of WEP. There is no protection authentication is used for WPA Enterprise [14]. RADIUS
against packet forgery, while data packets can be forged is used to secure extensive networks by securing
using third-party applications and injected into the centralized management through access control. As there
network [10]. is no centralized authentication server in small offices
(SOHO), the Pre-shared key is used to provide security
2.1.7. Attacks / Treats to the network, enabling the users to get access by
providing a password or a key [15]. Extensible
The most common attack for WEP is Keorek
Authentication Protocol (EAP) is the protocol used by the
Chopchop Attack, where the attacker tries to decrypt the
client during the authentication process. The
last bytes of plaintext using a 128-bit packet over the
authentication components in this protocol are the Client,
network. In this attack, the attacker modifies the captured
Access Point (AP) and Network Access Server (NAS).
data packet with his values and sends it back to the
The three-entity model was initially designed to use
wireless access point [11]. If the attacker's guess is
Point-to-Point Protocol (PPP) connections in a modem
correct, the wireless access point will accept the data
and Local Area Networks [16].
packet. This attack is highly possible, as there is a high
possibility of guessing the last byte of the encrypted data
encrypted in the data transmission. Another type of
common attack is Bittu's Fragmentation attack. This type
of attack is usually known as a fragmentation attack,
where the attacker tries to find the key stream length after
having the key stream [10].

2.2 WiFi Protected Access (WPA)


The WiFi Protected Access (WPA) is the wireless
security protocol introduced by Alliance to overcome the
security loopholes faced in the WEP protocol. This
protocol was introduced in 2003, and still, this protocol
is used in many devices to secure the witless network.
This protocol is a subset of 802.11i, and it is designed to
provide security to all versions of 802.11 devices,
including 802.11a, 802.11b, and 802.11g. WPA uses the
basic principle of WEP however, it rectifies its security
problems by providing improvements in security
problems of authentication and data integrity. Figure 2 WPA Authentication uses NAS

2.2.1. History In this model, the client obtains access to the network
through the network access server in the network. When
As security analysts have found weaknesses in the the client tries to connect to the access point, the request
WEP protocol, there is a high demand for an improved will be forwarded to the network access server by the
protocol. WAP is not a new protocol as it is an access point. NAS initially blocks access to the client,
enhancement for WEP protocol. WiFi Alliance and after verifying the client's authentication, the NAS
developed WAP in 2003 by adding a security layer to the will decide to grant permission or not. NAS act as a
WEP protocol. WiFi Alliance is a non-profit international

634
Atlantis Highlights in Computer Sciences, volume 4

broker between the client and the access point [17]. 2.2.6. Weaknesses
Figure 2 shows WPA Authentication uses NAS.
The Pairwise Master Key (PMK) implementation is
2.2.3. Encryption - Temporal Key Integrity weak as there is a loophole in Passphrase Choice in WPA
Protocol Interface. Also, this security protocol is very much
exposed to brute force attacks. The attacker will try every
TKIP algorithm acts as a wrapper to the old WEP possible permutation to generate keys and decrypt the
algorithm, providing more security to the WEP without encrypted message. Attackers use file header and other
modifying the WEP security flaws. According to [6], data to compare and validate key in the process of
TKIP is a cipher suite, an enhancement to the WEP cracking the key. Moreover, the Placement of MIC is
protocol on pre - RSNA hardware. Through Temporal considered as another issue. With the combination of a
Key Hash (TKH) function, WEP integrated devices will brute force attack, MIC can be used to validate the data
be more secured over the wireless network in the decrypted message [23]. There is a high-security
communication. Due to the introduction of CCMP, the weakness when the security protocol is changed through
TKIP was considered a short-term solution, as CCMP is firmware updates from WEP to WPA, as the weakness of
more advanced in providing security to the WEP [18]. WEP will still exist in WPA at a certain level [13].
Also, after the introduction of CCMP, the complicated
calculation slowed down the entire network. There was 2.2.7. Attacks / Treats
an increase in the data packet size, which makes the
network more inefficient [19]. Different keys are The introduction of Beck and Tews' attack, several
provided to do encryption in specified intervals. For weaknesses of TKIP was exposed, enabling the attacker
every ten thousand data packets, temporal keys are to find an easier path to decrypt ARP and facilitates DoS
changed. Due to this key mechanism, WPA networks are attack on the network. Ohigashi-Morii Attack is another
challenging to crack [20]. According to [13], TKIP uses possible attack to WPA networks. This is an
per packet key system through a dynamic key mechanism improvement of Beck and Tews' attack as time is reduced
and provides more security to the network. Advanced from 15 minutes to 1 minute to inject a fake data packet
Encryption Standard (AES) is also used as an optional to the network. This attack is exposed to all models of the
security enhancement for this protocol. After encryption WPA protocol.
keys are generated, a security verification will be done by In addition to that, Michael Attacks and Hole196
configuring TKIP. vulnerabilities are also possible on this protocol. Hole196
vulnerabilities are a type of man-in-middle attack, where
2.2.4. Key the attacker tries to manipulate the ARP request and
updating ARP tables of other users. Moreover, a
In WPA, keys are generated on the authentication Dictionary attack is also a common attack on this
server, and these keys are validated and certified. Pre- protocol, where the attacker tries to obtain the security
shared key (WPA – PSK), usually known as WPA key by using different words from the dictionary file. The
Personal, was used in this protocol. WPA-PSK uses a dictionary is a large text file with many different words
128-bit encryption key, which will be insufficient to with different characters [24].
break down. According to [21], TKIP allows creating 280
trillion possible keys for a data packet, leading to offer a
2.3 Wi-Fi Protected Access 2 (WPA2)
high-security key to the client.
Wi-Fi Protected Access 2 (WPA2) of IEEE 802.11i
2.2.5. Strengths standard is developed in 2004 as an enhancement for
WPA. Both encryption 802.1X/EAP authentication and
This protocol prevents forgeries by using the PSK authentication is used in this protocol. The most
cryptographic Message Integrity Code (MIC). MIC is significant change in this protocol is using the Advanced
used to detect the error in data packets. The data packet Encryption Standard (AES) for encryption. AES enables
may have an error due to the alteration of data packets or an adequate security level by ensuring that the current
errors in data transfer. Using the Message Integrity Code, technologies are insufficient to break a WPA2 network.
the wireless network will be secured from the man in the
middle attack and DoS attacks. In addition to that, replay
2.3.1. History
attacks are removed using a new Initialization Vector
(IV). Moreover, the key relaying mechanism is used to WPA2 was introduced in June 2004 with the
provide a new and fresh key for data encryption, enabling introduction of IEEE standard 802.11i. As WPA was
the attackers to make it difficult to break the network introduced as a temporary solution for WEP devices, this
[22]. protocol was introduced as a permanent /great lasting
solution for wireless networking devices. Significant
changes were introduced in this protocol, especially in

635
Atlantis Highlights in Computer Sciences, volume 4

the authentication process. Due to TKIP's weakness in 2.3.5. Strengths


the Message Integrity Check, a more secure algorithm
was introduced into WPA2, i.e. CCMP (Counter The introduction of WPA2 provides enough security
Mode/CBC-MAC Protocol) [25]. AES encryption was to the network users as it uses AES encryption to protect
created in October 2000 by, National Institute of the data. Moreover, CMMP encryption provides
Standards and Technology as a replacement for the RC4 encryption to the data packet header too, enabling the
algorithm. WPA2 is considered the most reliable wireless data and data packet to be well protected in this protocol.
security protocol [27]. The well-known strength of this protocol is the length of
the initialization vector (IV). 48-bits are allocated to
2.3.2. Authentication overcome the weakness of using 24-bit used in previous
protocols. Since brute force attacks, due to the
WPA2 uses the same authentication mechanism used complexity in the pre-shared key, are unpredictable and
in WPA. The two types of key management systems are time-consuming, and disk usage may arise. PMK caching
the authentication server and the pre-shared key. The pre- and pre-authentication support reduce the roaming time
shared keys are mostly used in home and small business, in streaming applications like video streaming and VoIP.
where an authentication server is not needed. For Small The roaming time is reduced from 1 second to 1/10
Office Home Office (SOHO) environment, it will be not second, which is a significant improvement in this
sufficient to establish an authentication server due to its protocol. PMK caching support enables wireless users to
complexity and cost. IEEE 802.11i protocol provides move from one access point to another without the need
enough security to pre-shared key generation and usage to re-authenticate on previously connected access points.
[4]. Pre-authentication support enables the client to be
authentic to the access point before moving to that access
Whereas, in a large organization, authentication
point, and the users will not realize the process happens,
servers are used. 802.1x key generation protocols are
as it is a very fast and quick process [23].
used to create matching Pairwise Master Keys (PMK).
On both sides, i.e. Supplicants and the server sides.
Whenever the client tries to connect to the access point
2.3.6. Weaknesses
four types of 128-bit temporal keys are generated. These Until now, significant weakness is not discovered in
keys are data encryption key, a data integrity key, WPA2; however, minor weaknesses exist in this
EAPOL-key encryption, and EAPOL-key integrity key protocol. The greatest weakness in WPA2 is the
[28]. implementation of PSK. The strength of PTK relies on
the strength of the PSK. According to [29], the second
2.3.3. Encryption message of 4 way handshake in the authentication
process of this protocol exposes to the dictionary and
WPA2 uses Advanced Encryption Standard (AES)
brute force attack. Moreover, there is a high processing
algorithm for encryption and decryption, addressing both
power in this protocol. High ended hardware devices are
data privacy and integrity in the network. AES's
needed to provide security to the network.
symmetric-key algorithm enables the use of the same key
for encryption and decryption [29]. AES is considered
the strongest block cipher as it uses a minimum 128-bit
2.3.7. Attacks / Treats
key and text blocks that make the algorithm secure. AES The most common attack for WPA2 is DoS attacks,
chipper is mostly combined with robust and sophisticated like RF jamming and data flooding, as none of the Wi-Fi
cryptographic algorithm, i.e. Counter Mode Cipher security protocols prevents these types of attacks. These
Block Chaining Message Authentication Code Protocol, attacks operate on Layer 2 of the network, so the physical
known merely as CMM mode Protocol. Here, Counter layer will not be able to prevent these attacks. Due to
Mode AES is used for encryption, while CBC-MAC is continuous requests sent to the access point, the access
used for authentication and integrity of the data [27]. point will not respond to all the requests [31].

2.3.4. Key In addition to that the implementation of management


frames enables the attacker to discover the topology used
In this protocol, Pairwise Transient Key (PTK) is in the network. The attacker will be able to find the
used to generate keys, allowing to have more secure keys locations of the access point, which enables them to
of 128 bit to 256-bit keys. Only the authorized entities attack more quickly. Moreover, the use of Control
will know the generated key, so it enables to provide Frames in the network opens DoS attacks from hackers
security to the data packets [30]. [30].
While implementing re-authentication, there is a
possibility of MAC address spoofing in this protocol, as
there is a weakness in the implementation of the re-

636
Atlantis Highlights in Computer Sciences, volume 4

authentication protocol. The attacker is to make Computer Science and Engineering, vol. 02, no. 05,
successful attacks when the user navigates from one pp. 1563–1571, 2010.
access point to another access point.
[10] A. Sari and M. Karay, “Comparative Analysis of
Wireless Security Protocols: WEP vs WPA,”
3. CONCLUSION
International Journal of Communications, Network
In this paper, the three security protocols used in and System Sciences, vol. 08, no. 12, pp. 483–491,
wireless networks are assessed, and each security 2015.
protocol's strengths and weaknesses are identified. [11] A. Sari, “Security issues in RFID Middleware
Through the information presented in this paper, network Systems: Proposed EPC implementation for
administrators and security specialists will be able to network layer attacks,” Transactions on Networks
determine the most suitable wireless protocol for the
and Communications, vol. 2, no. 5, Oct. 2014.
wireless network that caters for their business needs.
WPA2 protocol is the best protocol for Wi-Fi security, as [12] M. P. S and S. Pavithran, “Advanced Attack Against
this protocol provides several advantages over other Wireless Networks Wep, Wpa / Wpa2-Personal and
protocols. One of the key reasons to choose the WPA2 Wpa / Wpa2- Enterprise,” International Journal of
protocol is that it uses AES encryption, a reliable Scientific & Technology Research, vol. 4, no. 08,
encryption algorithm and is approved and recognized pp. 147–152, 2015.
worldwide.
[13] S. Rawal, “How Wireless Security Can Be
REFERENCES Compromised,” International Journal of Computer
Science Trends and Technology (IJCST), vol. 4, no.
[1] E. Tews, “Attacks on the WEP protocol,” IACR 1, pp. 1–4, 2016.
Cryptology ePrint Archive, 2007.
[14] A. B. Gali and A. B. A. Mustafa, “A Comparative
[2] M. Juwaini, R. Alsaqour, M. Abdelhaq, and O. Study between WEP, WPA and WPA2 Security
Alsukour, “A review on WEP wireless security Algorithms,” International Journal of Science and
protocol,” Journal of Theoretical and Applied Research (IJSR), vol. 4, no. 5, pp. 2390–2391, 2015.
Information Technology, vol. 40, no. 1, pp. 39–43,
[15] S. Malgaonkar, "Research on WiFi Security
2012.
Protocols," International Journal of Computer
[3] N. Sun, “A Study of Wireless Network Security,” Applications, vol. 164, no. 3, pp. 30–36, 2017.
Governors State University, 2010.
[16] K. Baek, S. W. Smith, and D. Kotz, “A Survey of
[4] M. Abreha, “History and implementation of IEEE WPA and 802. 11i RSN Authentication Protocols,”
802 security architecture,” IEEE Standards Dartmouth College Computer Science, 2004.
Education E-Magazine, 2016.
[17] U. Kumar and S. Gambhir, “Analysis and Literature
[5] G. Lehembre, "WiFi security – WEP, WPA and Review of IEEE 802.1x (Authentication)
WPA2," Hakin9, 2005. Protocols,” International Journal of Future
Generation Communication and Networking, vol. 7,
[6] M. Izhar, M. Shahid, and V. R. Singh, “Enhanced
no. 4, pp. 25–34, 2014.
Security Evaluation and Analysis of Wireless
Network based on MAC Protocol,” International [18] J. Huang, W. Susilo, and J. Seberry, “Observations
Journal of Scientific and Research Publication, vol. on the Message Integrity Code in IEEE 802. 11
3, no. 11, pp. 1–4, 2013. Wireless LANs,” University of Wollongong, 2004.
[7] S. Vibhuti, “IEEE 802. 11 WEP (Wired Equivalent [19] M. R. Doomun and K. M. S. Soyjaudah, “Modified
Privacy) Concepts and Vulnerability,” San Jose Temporal Key Integrity Protocol for Efficient
State University, CA, USA, 2005. Wireless Network Security.,” in SECRYPT 2007 -
International Conference on Security and
[8] D. B. N. Arif Sari, “Securing Mobile Ad Hoc
Cryptography, 2007, pp. 151–156.
Networks against Jamming Attacks through Unified
Security Mechanism,” International Journal of Ad [20] A. I. Angela, “Evaluation of Enhanced Security
hoc, Sensor & Ubiquitous Computing (IJASUC), Solutions in 802.11-Based Networks,” International
vol. 3, no. 3, pp. 79–94, 2012. Journal of Network Security & Its Applications
(IJNSA), vol. 6, no. 4, pp. 29–42, 2014.
[9] A. L. Vani B Associate Professor, “A Survey of
Denial of Service Attacks and it’s Countermeasures [21] F. H. Katz, “WPA vs. WPA2: Is WPA2 Really an
on Wireless Network,” International Journal on Improvement on WPA?” in 2010 4th Annual

637
Atlantis Highlights in Computer Sciences, volume 4

Computer Security Conference (CSC 2010), 2010, [34] Vadivel, S., Konda, S., Balmuri, K.R., Stateczny, A.
pp. 1–4. and Parameshachari, B.D., 2021. Dynamic Route
[22] M. Mohi, E. Adam, A. Gasim, and E. Abdallah, Discovery Using Modified Grasshopper
"WiFi Security," International Journal of Advances Optimization Algorithm in Wireless Ad-Hoc
in Engineering and Management (IJAEM), vol. 2, Visible Light Communication Network.
no. 2, pp. 143–149, 2015. Electronics, 10(10), p.1176.

[23] M. S. Prastavana, S.P. and Praveen, "Wireless [35] Nguyen, T., Liu, B.H., Nguyen, N., Dumba, B. and
Security Using WiFi Protected Access 2 (WPA2)," Chou, J.T., 2021. Smart Grid Vulnerability and
International Journal of Scientific Engineering and Defense Analysis Under Cascading Failure Attacks.
Applied Science (IJSEAS)-ISSN, vol. 2, no. 1, pp. IEEE Transactions on Power Delivery.
374–382, 2016. [36] Nguyen, N.T., Liu, B.H., Pham, V.T. and Luo, Y.S.,
[24] M. Caneill and J. Gilis, “Attacks against the WiFi 2016. On maximizing the lifetime for data
protocols WEP and WPA,” Journal, 2010. aggregation in wireless sensor networks using
virtual data aggregation trees. Computer Networks,
[25] A. H. Adnan et al., “A comparative study of WLAN 105, pp.99-110.
security protocols: WPA, WPA2,” in Proceedings of
2015 3rd International Conference on Advances in [37] Nguyen, N.T. and Liu, B.H., 2018. The mobile
Electrical Engineering, ICAEE 2015, 2016, pp. sensor deployment problem and the target coverage
165–169. problem in mobile wireless sensor networks are NP-
hard. IEEE Systems Journal, 13(2), pp.1312-1315.
[26] M. Vanhoef Imec-Distrinet, "WiFuzz: detecting and
exploiting logical flaws in the WiFi cryptographic [38] Prabu, S., Velan, B., Jayasudha, F.V., Visu, P. and
handshake WiFuzz: detecting and exploiting logical Janarthanan, K., 2020. Mobile technologies for
flaws in the WiFi handshake," imec-DistriNet, contact tracing and prevention of COVID-19
2018. positive cases: a cross-sectional study. International
Journal of Pervasive Computing and
[27] S. Alblwi, K. Shujaee, and C. Atlanta, “A Survey on Communications.
Wireless Security Protocol WPA2,” in International
Conference on Security and Management - SAM17, [39] Arun, M., Baraneetharan, E., Kanchana, A. and
2017, pp. 12–17. Prabu, S., 2020. Detection and monitoring of the
asymptotic COVID-19 patients using IoT devices
[28] G. M. Pérez, S. M. Thampi, R. Ko, and L. Shu, "A and sensors. International Journal of Pervasive
Survey on WiFi Protocols:WPA and WPA2," Computing and Communications.
Springer-, Berlin, 2014.
[40] K. Yu, Z. Guo, Y. Shen, W. Wang, J. C. Lin, T. Sato,
[29] M. M. Armin Akte, A.K.M. Nazmus Sakib, Fariha “Secure Artificial Intelligence of Things for Implicit
Tasmin Jaigirdar, "Security Improvement of WPA 2 Group Recommendations”, IEEE Internet of Things
(WiFi Protected Access 2), “International Journal of Journal, 2021, doi: 10.1109/JIOT.2021.3079574.
Engineering Science and Technology (IJEST)
Security, vol. 3, no. 1, pp. 723–729, 2011. [41] K. Yu, L. Tan, S. Mumtaz, S. Al-Rubaye, A. Al-
Dulaimi, A. K. Bashir, F. A. Khan, “Securing
[30] E. B. Barker and A. Roginsky, “Recommendation Critical Infrastructures: Deep Learning-based
for Cryptographic Key Generation,” NIST Special Threat Detection in the IIoT”, IEEE
Publication 800-133, 2012. Communications Magazine, 2021.
[31] P. Arana, "Benefits and Vulnerabilities of WiFi [42] L. Tan, K. Yu, F. Ming, X. Cheng, G. Srivastava,
Protected Access 2 (WPA2)," Global Journal of “Secure and Resilient Artificial Intelligence of
Computer Science and Technology, vol. 612, pp. 1– Things: a HoneyNet Approach for Threat Detection
6, 2006. and Situational Awareness”, IEEE Consumer
[32] Kiran, P., Parameshachari, B.D., Yashwanth, J. and Electronics Magazine, 2021, doi:
Bharath, K.N., 2021. Offline Signature Recognition 10.1109/MCE.2021.3081874.
Using Image Processing Techniques and Back [43] L. Tan, N. Shi, K. Yu, M. Aloqaily, Y. Jararweh, “A
Propagation Neuron Network System. SN Blockchain-Empowered Access Control
Computer Science, 2(3), pp.1-8. Framework for Smart Devices in Green Internet of
[33] Jagannathan, P., Rajkumar, S., Frnda, J., Things”, ACM Transactions on Internet
Divakarachari, P.B. and Subramani, P., 2021. Technology, vol. 21, no. 3, pp. 1-20,
Moving Vehicle Detection and Classification Using 2021,https://doi.org/10.1145/3433542.
Gaussian Mixture Model and Ensemble Deep
Learning Technique. Wireless Communications and
Mobile Computing, 2021.

638

You might also like