Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this...
- Autores:
- Tipo de recurso:
- Fecha de publicación:
- 2018
- Institución:
- Universidad Pedagógica y Tecnológica de Colombia
- Repositorio:
- RiUPTC: Repositorio Institucional UPTC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.uptc.edu.co:001/14204
- Acceso en línea:
- https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748
https://repositorio.uptc.edu.co/handle/001/14204
- Palabra clave:
- data security
information security
intrusion detection
wireless security
detección de intrusión
seguridad de datos
seguridad de la información
seguridad inalámbrica
- Rights
- License
- Copyright (c) 2018 Alberto Acosta-López, Elver Yesid Melo-Monroy, Pablo Andrés Linares-Murcia
id |
REPOUPTC2_ea02262f6f287b0eb7fdedae7a53ec79 |
---|---|
oai_identifier_str |
oai:repositorio.uptc.edu.co:001/14204 |
network_acronym_str |
REPOUPTC2 |
network_name_str |
RiUPTC: Repositorio Institucional UPTC |
repository_id_str |
|
spelling |
2018-01-152024-07-05T19:11:35Z2024-07-05T19:11:35Zhttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/774810.19053/01211129.v27.n47.2018.7748https://repositorio.uptc.edu.co/handle/001/14204Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.Debido al surgimiento de nuevas técnicas y tecnologías de intrusión, los protocolos de redes inalámbricas quedan obsoletos; para ello se busca vulnerar la seguridad del protocolo WPA2, que es ampliamente usado por los proveedores de servicios colombianos. En la primera parte, el artículo hace una introducción del protocolo WPA2, describiendo su funcionamiento y los ataques de los cuales puede ser objeto; en la segunda parte se muestra la metodología que se usó para recolectar pruebas y realizar la evaluación necesaria para la elaboración de este documento. Se presentan las herramientas para auditoria de las redes inalámbricas Linset y Aircrack-ng, las cuales fueron seleccionadas para la evaluación de seguridad del protocolo. Finalmente, se muestran los resultados y las conclusiones.application/pdfapplication/xmlengengUniversidad Pedagógica y Tecnológica de Colombiahttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/6138https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/7195Copyright (c) 2018 Alberto Acosta-López, Elver Yesid Melo-Monroy, Pablo Andrés Linares-Murciahttp://purl.org/coar/access_right/c_abf369http://purl.org/coar/access_right/c_abf2Revista Facultad de Ingeniería; Vol. 27 No. 47 (2018); 73-80Revista Facultad de Ingeniería; Vol. 27 Núm. 47 (2018); 73-802357-53280121-1129data securityinformation securityintrusion detectionwireless securitydetección de intrusiónseguridad de datosseguridad de la informaciónseguridad inalámbricaEvaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng toolsEvaluación de seguridad en protocolo de red inalámbrico WPA2-PSK usando las herramientas Linset y Aircrack-ngresearchinvestigacióninfo:eu-repo/semantics/articlehttp://purl.org/coar/resource_type/c_2df8fbb1info:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a452http://purl.org/coar/version/c_970fb48d4fbd8a85Acosta-López, AlbertoMelo-Monroy, Elver YesidLinares-Murcia, Pablo Andrés001/14204oai:repositorio.uptc.edu.co:001/142042025-07-18 11:53:51.354metadata.onlyhttps://repositorio.uptc.edu.coRepositorio Institucional UPTCrepositorio.uptc@uptc.edu.co |
dc.title.en-US.fl_str_mv |
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
dc.title.es-ES.fl_str_mv |
Evaluación de seguridad en protocolo de red inalámbrico WPA2-PSK usando las herramientas Linset y Aircrack-ng |
title |
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
spellingShingle |
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools data security information security intrusion detection wireless security detección de intrusión seguridad de datos seguridad de la información seguridad inalámbrica |
title_short |
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title_full |
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title_fullStr |
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title_full_unstemmed |
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title_sort |
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
dc.subject.en-US.fl_str_mv |
data security information security intrusion detection wireless security |
topic |
data security information security intrusion detection wireless security detección de intrusión seguridad de datos seguridad de la información seguridad inalámbrica |
dc.subject.es-ES.fl_str_mv |
detección de intrusión seguridad de datos seguridad de la información seguridad inalámbrica |
description |
Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions. |
publishDate |
2018 |
dc.date.accessioned.none.fl_str_mv |
2024-07-05T19:11:35Z |
dc.date.available.none.fl_str_mv |
2024-07-05T19:11:35Z |
dc.date.none.fl_str_mv |
2018-01-15 |
dc.type.en-US.fl_str_mv |
research |
dc.type.es-ES.fl_str_mv |
investigación |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.coarversion.spa.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a452 |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748 10.19053/01211129.v27.n47.2018.7748 |
dc.identifier.uri.none.fl_str_mv |
https://repositorio.uptc.edu.co/handle/001/14204 |
url |
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748 https://repositorio.uptc.edu.co/handle/001/14204 |
identifier_str_mv |
10.19053/01211129.v27.n47.2018.7748 |
dc.language.none.fl_str_mv |
eng |
dc.language.iso.spa.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/6138 https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/7195 |
dc.rights.en-US.fl_str_mv |
Copyright (c) 2018 Alberto Acosta-López, Elver Yesid Melo-Monroy, Pablo Andrés Linares-Murcia |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf369 |
rights_invalid_str_mv |
Copyright (c) 2018 Alberto Acosta-López, Elver Yesid Melo-Monroy, Pablo Andrés Linares-Murcia http://purl.org/coar/access_right/c_abf369 http://purl.org/coar/access_right/c_abf2 |
dc.format.none.fl_str_mv |
application/pdf application/xml |
dc.publisher.en-US.fl_str_mv |
Universidad Pedagógica y Tecnológica de Colombia |
dc.source.en-US.fl_str_mv |
Revista Facultad de Ingeniería; Vol. 27 No. 47 (2018); 73-80 |
dc.source.es-ES.fl_str_mv |
Revista Facultad de Ingeniería; Vol. 27 Núm. 47 (2018); 73-80 |
dc.source.none.fl_str_mv |
2357-5328 0121-1129 |
institution |
Universidad Pedagógica y Tecnológica de Colombia |
repository.name.fl_str_mv |
Repositorio Institucional UPTC |
repository.mail.fl_str_mv |
repositorio.uptc@uptc.edu.co |
_version_ |
1839633884244869120 |