Emerging Technologies in Computing. First International Conference, iCETiC 2018, London, UK, August 23–24, 2018, Proceedings

Research Article

Analysis and Evaluation of Wireless Networks by Implementation of Test Security Keys

  • @INPROCEEDINGS{10.1007/978-3-319-95450-9_9,
        author={Arifur Rahman and Maaruf Ali},
        title={Analysis and Evaluation of Wireless Networks by Implementation of Test Security Keys},
        proceedings={Emerging Technologies in Computing. First International Conference, iCETiC 2018, London, UK, August 23--24, 2018, Proceedings},
        proceedings_a={ICETIC},
        year={2018},
        month={7},
        keywords={Wired Equivalent Privacy WEP Wireless Protected Access WPA WPA2 Penetration testing Keys Hacking Kali Linux},
        doi={10.1007/978-3-319-95450-9_9}
    }
    
  • Arifur Rahman
    Maaruf Ali
    Year: 2018
    Analysis and Evaluation of Wireless Networks by Implementation of Test Security Keys
    ICETIC
    Springer
    DOI: 10.1007/978-3-319-95450-9_9
Arifur Rahman1,*, Maaruf Ali2,*
  • 1: PHASTAR
  • 2: International Association for Educators and Researchers (IAER)
*Contact email: arif.rahman@phastar.com, maaruf@theiaer.org

Abstract

There are so many weaknesses found in the Wired Equivalent Privacy (WEP) key usage protocol and even in the improved Wireless Protected Access (WPA) security key generation algorithm that often mixed mode WPA- WPA2 or WPA2 are utilized - as they are considered a more secure way to obtain wireless security generated keys to date. This paper reports on a practical investigation to test the weaknesses of wireless network security keys, recommend more secure keys and provide a solution to increase the security level of the wireless network. Penetration tests are initiated using the Kali Linux operating system with the help of penetration testing tools to hack WPA-WPA2 mixed mode of access and then provide a solution to increase the security of wireless networks. This will greatly reduce the likelihood of the most common network attacks. The findings of the project will benefit users to both under- stand and to learn about possible loopholes within their wireless networks. Furthermore, the finding will also act as a guideline for the domestic Wi-Fi user about different security settings having implications on their Wi-Fi security.