loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: George E. Violettas ; Tryfon L. Theodoroy ; Konstantinos Chalkias and George Stephanides

Affiliation: University of Macedonia, Greece

ISBN: 978-989-8111-62-3

Keyword(s): Mac Spoofing, War Drive, Wi-Fi Security, wireless intrusion, WEP Attacks, WPA Attacks.

Related Ontology Subjects/Areas/Topics: Home Area Networks ; Performance Analysis of Wireless Networks ; Sensor, Mesh and Ad Hoc Communications and Networks ; Telecommunications ; Wireless and Mobile Technologies ; Wireless Information Networks and Systems

Abstract: This paper is a study of the use and possible flaws of the two basic cryptographic protocols (WEP, WPA) in Wi-Fi Networks. It presents some very easy to implement methods to gain malicious access to such networks by disclosing the network secret key, using Windows Operating Systems, like Win XP. It also describes the shutter of the myth saying that the MAC Address filtering is a safe practice for securing a wireless network. There is a field research, in which we show the distribution of wireless networks according to the security protocol implemented (if any) at a major city centre in Greece. Unfortunately, according to our results, only 8% of the wireless networks are using a fairly safe cryptographic scheme, 48% is not using any security at all, while the rest is using the totally unsecure WEP encryption.

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.80.177.176

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
E. Violettas G., L. Theodoroy T., Chalkias K. and Stephanides G. (2008). SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki.In Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008) ISBN 978-989-8111-62-3, pages 96-101. DOI: 10.5220/0002027900960101

@conference{winsys08,
author={George E. Violettas and Tryfon L. Theodoroy and Konstantinos Chalkias and George Stephanides},
title={SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki},
booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)},
year={2008},
pages={96-101},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002027900960101},
isbn={978-989-8111-62-3},
}

TY - CONF

JO - Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2008)
TI - SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki
SN - 978-989-8111-62-3
AU - E. Violettas G.
AU - L. Theodoroy T.
AU - Chalkias K.
AU - Stephanides G.
PY - 2008
SP - 96
EP - 101
DO - 10.5220/0002027900960101

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.