A Methodology for WLAN Vulnerability Study
Ahmed Ismail Mohamed Abdelrahman;
Abstract
Abstract
Nowadays, WPA/WPA2 is used for the authentication and encryptsion process of the most used WLANs. PSK mode is the dominant authentication mode for most of WLANs represented in small or non-professional networks. Cracking PSK password is discussed and implemented in many online tools and scientific papers with no clarification of links between the cracking process and WLAN standards. This thesis shows proficiency of all required aspects to cover that link's gap, and paves the way of proposing security and protection tools.
Nowadays, WPA/WPA2 is used for the authentication and encryptsion process of the most used WLANs. PSK mode is the dominant authentication mode for most of WLANs represented in small or non-professional networks. Cracking PSK password is discussed and implemented in many online tools and scientific papers with no clarification of links between the cracking process and WLAN standards. This thesis shows proficiency of all required aspects to cover that link's gap, and paves the way of proposing security and protection tools.
Other data
| Title | A Methodology for WLAN Vulnerability Study | Other Titles | طريقة لدراسة ثغرات الامان فى الشبكات اللاسلكية المحلية | Authors | Ahmed Ismail Mohamed Abdelrahman | Issue Date | 2019 |
Attached Files
| File | Size | Format | |
|---|---|---|---|
| CC2045.pdf | 930.66 kB | Adobe PDF | View/Open |
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.