SciELO - Scientific Electronic Library Online

 
vol.19 special issueUsing neural networks for face recognition in controlled environmentsTechnique for recurrences solving, used in recursive algorithm complexity analysis author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • On index processCited by Google
  • Have no similar articlesSimilars in SciELO
  • On index processSimilars in Google

Share


Tecnura

Print version ISSN 0123-921X

Abstract

MENDEZ MORENO, Wilmer Antonio; MOSQUERA PALACIOS, Darin Jairo  and  RIVAS TRUJILLO, Edwin. WEP, WPA and WPA2 encryption protocols vulnerability on wireless networks with Linux platform. Tecnura [online]. 2015, vol.19, n.spe, pp.79-87. ISSN 0123-921X.  https://doi.org/10.14483/udistrital.jour.tecnura.2015.3.a06.

During the development of telecommunications, several encryption algorithms have been adopted and applied to wireless networks. In operating systems such as Linux, the tools for data transmission over wireless networks are reaching a level of sophistication in reference to other widespread operating systems that are supported by the manufacturers. Thus, designers of protocols for different operating systems, especially Linux, have made every effort to improve the shortcomings of the encryption algorithms. This article analyzes the performance of encryption algorithms which work on the protocols WEP, WPA and WPA2 to provide an overview of how and why wireless protocols and encryption protection must achieve a more scientific basis to detect and prevent attacks, in order to meet the shortcomings associated with encryption algorithms that are currently present.

Keywords : Wireless Security; WEP; WPA; WPA2; 802.11i; 802.11X.

        · abstract in Spanish     · text in English     · English ( pdf )

 

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License