Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools

dc.contributor.authorAcosta López, Alberto
dc.contributor.authorMelo Monroy, Elver Yesid
dc.contributor.authorLinares Murcia, Pablo Andrés
dc.date.accessioned2018-09-07T20:30:39Z
dc.date.available2018-09-07T20:30:39Z
dc.date.issued2018-01-15
dc.description1 recurso en línea (páginas 73-80).spa
dc.description.abstractDevido ao surgimento de novas técnicas e tecnologias de intrusão, os protocolos de redes sem fio ficam obsoletas; para isso, busca-se vulnerar a segurança do protocolo WPA2, que é amplamente usado pelos provedores de serviços colombianos. Na primeira parte, o artigo faz uma introdução do protocolo WPA2, descrevendo seu funcionamento e os ataques dos quais pode ser objeto; na segunda parte mostra-se a metodologia que se usou para recolher provas e realizar a avaliação necessária para a elaboração deste documento. Apresentam-se as ferramentas para auditoria das redes sem fio Linset e Aircrack-ng, as quais foram selecionadas para a avaliação de segurança do protocolo. Finalmente, mostram-se os resultados e as conclusões.por
dc.description.abstractDue to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.eng
dc.description.abstractDebido al surgimiento de nuevas técnicas y tecnologías de intrusión, los protocolos de redes inalámbricas quedan obsoletos; para ello se busca vulnerar la seguridad del protocolo WPA2, que es ampliamente usado por los proveedores de servicios colombianos. En la primera parte, el artículo hace una introducción del protocolo WPA2, describiendo su funcionamiento y los ataques de los cuales puede ser objeto; en la segunda parte se muestra la metodología que se usó para recolectar pruebas y realizar la evaluación necesaria para la elaboración de este documento. Se presentan las herramientas para auditoría de las redes inalámbricas Linset y Aircrack-ng, las cuales fueron seleccionadas para la evaluación de seguridad del protocolo. Finalmente, se muestran los resultados y las conclusiones.spa
dc.description.notesBibliografía y webgrafía: páginas 79-80.spa
dc.format.mimetypeapplication/pdfspa
dc.identifier.citationAcosta López, A., Melo Monroy, E. Y. & Linares Murcia, P. A. (2018). Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools. Revista Facultad de Ingeniería, 27(47), 73-80. https://doi.org/10.19053/01211129.v27.n47.2018.7748. http://repositorio.uptc.edu.co/handle/001/2163.spa
dc.identifier.doi10.19053/01211129.v27.n47.2018.7748
dc.identifier.issn2357-5328
dc.identifier.urihttp://repositorio.uptc.edu.co/handle/001/2163
dc.language.isoengspa
dc.publisherUniversidad Pedagógica y Tecnológica de Colombiaspa
dc.relation.ispartofjournalRevista Facultad de Ingeniería;Volumen 27, número 47 (Enero-Abril 2018)spa
dc.relation.referencesD. Lemos, “El secreto en la nube,” [Online]. Available: http://www.digiware.net/?q=es/blog/elsecreto- de-la-nube [Accessed Apr. 30, 2017].spa
dc.relation.referencesR. Juan, “Redes inalámbricas Principales protocolos,” 2011. [Online]. Available: http://deredes.net/redesinalambricas- principales-protocolos/ [Accessed Apr. 28, 2017].spa
dc.relation.referencesA. Hassan Adnan, “A comparative study of WLAN security protocols: WPA, WPA2,” in International Conference on advances in Eletronical Engineering (IEEE), Dhaka, Bangladesh, 2015.spa
dc.relation.referencesIntel, “Wi-Fi diferentes protocolos y velocidades de datos,” 2017. [Online] Aviable: http://www.intel. la/content/www/xl/es/support/articles/000005725/ network-and-i-o/wireless-networking.html [Accessed May. 20 2017].spa
dc.relation.referencesIEEE “802.11-2016 - IEEE Standard for information technology,” 2016. [Online]. Available: http:// ieeexplore.ieee.org/document/7786995/ [Accessed May 21, 2017].spa
dc.relation.referencesJ. Ruz Maluenda, B. Riveros Vasquez, and A. Varas Escobar, “Redes WPA/WPA2,” [Online] Available: http://profesores.elo.utfsm.cl/~agv/elo322/1s12/ project/reports/RuzRiverosVaras.pdf [Accessed May. 20, 2017].spa
dc.relation.referencesCiberseguridad wikia, “Ataques TCP/IP,” 2013. [Online] Available: http://es.ciberseguridad.wikia. com/wiki/Ataques_TCP/IP [Accessed May. 24, 2017].spa
dc.relation.referencesS. Dietrich, D. Dittrich, and P. Reiher. Denial of Service. Attack and Defense Mechanisms. NJ: Prentice Hall. 2004.spa
dc.relation.referencesWifislax “Presentación,” [Online] Available: http:// www.wifislax.com [Accessed Jun. 4, 2017].spa
dc.relation.referencesA. Maroto, “Crackeando Redes Wi-Fi: WPA y WPA2 –PSK,” 2016 [Online] Available: http://www.tic.udc. es/~nino/blog/lsi/reports/wpa.pdf [Accessed Jan. 20, 2017].spa
dc.relation.referencesAircrack-ng, “Introduction,” [Online] Available: http://www.aircrack-ng.org/doku.php [Accessed Mar. 27, 2017].spa
dc.relation.referencesVMware, “Workstation pro,” [Online] Available: http://www.vmware.com/co/products/workstation. html [Accessed Mar, 30 2017].spa
dc.rightsCopyright (c) 2018 Universidad Pedagógica y Tecnológica de Colombiaspa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.coarhttp://purl.org/coar/access_right/c_abf2spa
dc.rights.creativecommonsAtribución-NoComercial 4.0 Internacional (CC BY-NC 4.0)spa
dc.rights.urihttps://creativecommons.org/licenses/by-nc/4.0/spa
dc.sourcehttps://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/6138spa
dc.subject.armarcInformation security
dc.subject.armarcData transmission systems
dc.subject.proposalData securityspa
dc.subject.proposalIntrusion detectionspa
dc.subject.proposalWireless securityspa
dc.titleEvaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng toolsspa
dc.title.alternativeEvaluación de seguridad en protocolo de red inalámbrico WPA2-PSK usando las herramientas Linset y Aircrack-ngspa
dc.title.alternativeAvaliação de segurança em protocolo de rede sem fio WPA2-PSK usando as ferramentas Linset e Aircrack-ngspa
dc.typeArtículo de revistaspa
dc.type.coarhttp://purl.org/coar/resource_type/c_6501spa
dc.type.coarversionhttp://purl.org/coar/version/c_970fb48d4fbd8a85spa
dc.type.contentTextspa
dc.type.driverinfo:eu-repo/semantics/articlespa
dc.type.redcolhttps://purl.org/redcol/resource_type/ARTspa
dc.type.versioninfo:eu-repo/semantics/publishedVersionspa
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
PPS_879_Evaluation_of_the_WPA2-PSK.pdf
Size:
597.78 KB
Format:
Adobe Portable Document Format
Description:
Archivo principal
Descargar
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
14.45 KB
Format:
Item-specific license agreed upon to submission
Description:
Descargar