Browse > Article
http://dx.doi.org/10.6109/jicce.2012.10.2.156

Hacking and Security of Encrypted Access Points in Wireless Network  

Kwon, Se-Hwan (Department of IT Application Technology, Hoseo Graduate School of Venture)
Park, Dea-Woo (Department of IT Application Technology, Hoseo Graduate School of Venture)
Abstract
An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.
Keywords
Aceess point; Hacking; Wi-Fi; Wi-Fi protected access; Wi-Fi protected access 2;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. S. Kang and C. S. Hong, " A prevention mechanism against Dos attack using the TKIP in wireless LAN environment," Proceedings of the Korea Computer Congress, Pyeongchang, Korea, pp. 145-147, 2005.
2 C. G. Park, "Methods of WAP gateway capacity dimensioning and traffic forecasting," Journal of the Korean Institute of Communication Sciences, vol. 35, no. 4, pp. 576-586, 2010.
3 Wi-Fi protected access 2 [Internet]. Available: http://choidgo.blog.me/54403682
4 C. K. Hong and Y. J. Jeong, "Design and implementation of IEEE 802.11i MAC layer," Journal of the Korean Institute of Communication Sciences, vol. 34, no. 8, pp. 640-647, 2009.
5 H. B. Kim and S. J. Lee, "Study on secure unattended defence system implementation using wireless sensor network," Proceedings of the Korean Society for Internet Information, vol. 7, no.2, pp. 177-182, 2006.
6 S. Lee, J. Kang, H. Moon, M. Lee, and Cl. K. Kim "Per packet authentication scheme using one-bit in 802.11 wireless LAN," The KIPS Transactions : Part C, vol. 12C, no.4, pp. 465-472, 2005.   DOI   ScienceOn
7 W. S. Chun and D. W. Park, "A study of forensic on eavesdropping from VoIP and messenger through WiBro network," Journal of th Korea Society of Computer and Information, vol. 14, no. 5, pp. 149-156, 2009.
8 H. C. Jung and H Lee, "Study on security reinforcement method by wireless security status survey and analysis," Proceedings of the Korea Information Processing Society Conference, Seoul, Korea, pp. 857-860, 2006.