Authors: Achilleas Tsitroulis; Dimitris Lampoudis; Emmanuel Tsekleves

Addresses: Brunel University, School of Engineering and Design, Kingston Lane, Uxbridge, UB8 3PH, UK ' Department of Information Systems, University of Macedonia (U.O.M.), Greece ' Lancaster University, Imagination Lancaster, LICA Building, Bailrigg, Lancaster, LA1 4YW, UK

Abstract: Wi-Fi protected access 2 (WPA2) is considered one of the most secure protocols employed in wireless local area networks (WLANs). This is despite of having significant security vulnerabilities. The aim of this paper is two-fold. Firstly it analyses the WPA2 security protocol and presents its weaknesses in detail. Secondly it presents a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Importantly, proposals on how to enhance its security are offered.

Keywords: wireless security; 802.11 security; wifi protected access 2; WPA2 vulnerabilities; WPA; privacy; authentication; wireless LANS; local area networks; WLANs; security protocols; network security; malicious attacks.

DOI: 10.1504/IJICS.2014.059797

International Journal of Information and Computer Security, 2014 Vol.6 No.1, pp.93 - 107