Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools

Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2018
Institución:
Universidad Pedagógica y Tecnológica de Colombia
Repositorio:
RiUPTC: Repositorio Institucional UPTC
Idioma:
eng
OAI Identifier:
oai:repositorio.uptc.edu.co:001/14204
Acceso en línea:
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748
https://repositorio.uptc.edu.co/handle/001/14204
Palabra clave:
data security
information security
intrusion detection
wireless security
detección de intrusión
seguridad de datos
seguridad de la información
seguridad inalámbrica
Rights
License
Copyright (c) 2018 Alberto Acosta-López, Elver Yesid Melo-Monroy, Pablo Andrés Linares-Murcia
id REPOUPTC2_ea02262f6f287b0eb7fdedae7a53ec79
oai_identifier_str oai:repositorio.uptc.edu.co:001/14204
network_acronym_str REPOUPTC2
network_name_str RiUPTC: Repositorio Institucional UPTC
repository_id_str
spelling 2018-01-152024-07-05T19:11:35Z2024-07-05T19:11:35Zhttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/774810.19053/01211129.v27.n47.2018.7748https://repositorio.uptc.edu.co/handle/001/14204Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.Debido al surgimiento de nuevas técnicas y tecnologías de intrusión, los protocolos de redes inalámbricas quedan obsoletos; para ello se busca vulnerar la seguridad del protocolo WPA2, que es ampliamente usado por los proveedores de servicios colombianos. En la primera parte, el artículo hace una introducción del protocolo WPA2, describiendo su funcionamiento y los ataques de los cuales puede ser objeto; en la segunda parte se muestra la metodología que se usó para recolectar pruebas y realizar la evaluación necesaria para la elaboración de este documento. Se presentan las herramientas para auditoria de las redes inalámbricas Linset y Aircrack-ng, las cuales fueron seleccionadas para la evaluación de seguridad del protocolo. Finalmente, se muestran los resultados y las conclusiones.application/pdfapplication/xmlengengUniversidad Pedagógica y Tecnológica de Colombiahttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/6138https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/7195Copyright (c) 2018 Alberto Acosta-López, Elver Yesid Melo-Monroy, Pablo Andrés Linares-Murciahttp://purl.org/coar/access_right/c_abf369http://purl.org/coar/access_right/c_abf2Revista Facultad de Ingeniería; Vol. 27 No. 47 (2018); 73-80Revista Facultad de Ingeniería; Vol. 27 Núm. 47 (2018); 73-802357-53280121-1129data securityinformation securityintrusion detectionwireless securitydetección de intrusiónseguridad de datosseguridad de la informaciónseguridad inalámbricaEvaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng toolsEvaluación de seguridad en protocolo de red inalámbrico WPA2-PSK usando las herramientas Linset y Aircrack-ngresearchinvestigacióninfo:eu-repo/semantics/articlehttp://purl.org/coar/resource_type/c_2df8fbb1info:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a452http://purl.org/coar/version/c_970fb48d4fbd8a85Acosta-López, AlbertoMelo-Monroy, Elver YesidLinares-Murcia, Pablo Andrés001/14204oai:repositorio.uptc.edu.co:001/142042025-07-18 11:53:51.354metadata.onlyhttps://repositorio.uptc.edu.coRepositorio Institucional UPTCrepositorio.uptc@uptc.edu.co
dc.title.en-US.fl_str_mv Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
dc.title.es-ES.fl_str_mv Evaluación de seguridad en protocolo de red inalámbrico WPA2-PSK usando las herramientas Linset y Aircrack-ng
title Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
spellingShingle Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
data security
information security
intrusion detection
wireless security
detección de intrusión
seguridad de datos
seguridad de la información
seguridad inalámbrica
title_short Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
title_full Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
title_fullStr Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
title_full_unstemmed Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
title_sort Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
dc.subject.en-US.fl_str_mv data security
information security
intrusion detection
wireless security
topic data security
information security
intrusion detection
wireless security
detección de intrusión
seguridad de datos
seguridad de la información
seguridad inalámbrica
dc.subject.es-ES.fl_str_mv detección de intrusión
seguridad de datos
seguridad de la información
seguridad inalámbrica
description Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.
publishDate 2018
dc.date.accessioned.none.fl_str_mv 2024-07-05T19:11:35Z
dc.date.available.none.fl_str_mv 2024-07-05T19:11:35Z
dc.date.none.fl_str_mv 2018-01-15
dc.type.en-US.fl_str_mv research
dc.type.es-ES.fl_str_mv investigación
dc.type.none.fl_str_mv info:eu-repo/semantics/article
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a452
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748
10.19053/01211129.v27.n47.2018.7748
dc.identifier.uri.none.fl_str_mv https://repositorio.uptc.edu.co/handle/001/14204
url https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748
https://repositorio.uptc.edu.co/handle/001/14204
identifier_str_mv 10.19053/01211129.v27.n47.2018.7748
dc.language.none.fl_str_mv eng
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/6138
https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/7195
dc.rights.en-US.fl_str_mv Copyright (c) 2018 Alberto Acosta-López, Elver Yesid Melo-Monroy, Pablo Andrés Linares-Murcia
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf369
rights_invalid_str_mv Copyright (c) 2018 Alberto Acosta-López, Elver Yesid Melo-Monroy, Pablo Andrés Linares-Murcia
http://purl.org/coar/access_right/c_abf369
http://purl.org/coar/access_right/c_abf2
dc.format.none.fl_str_mv application/pdf
application/xml
dc.publisher.en-US.fl_str_mv Universidad Pedagógica y Tecnológica de Colombia
dc.source.en-US.fl_str_mv Revista Facultad de Ingeniería; Vol. 27 No. 47 (2018); 73-80
dc.source.es-ES.fl_str_mv Revista Facultad de Ingeniería; Vol. 27 Núm. 47 (2018); 73-80
dc.source.none.fl_str_mv 2357-5328
0121-1129
institution Universidad Pedagógica y Tecnológica de Colombia
repository.name.fl_str_mv Repositorio Institucional UPTC
repository.mail.fl_str_mv repositorio.uptc@uptc.edu.co
_version_ 1839633884244869120