Uneingeschränkter Zugang

Security Evaluation of Wireless Network Access Points


Zitieren

[1] “Internet of Things - Lietiskais internets (IoT),” May 2016. [Online]. Available: https://cert.lv/uploads/Ieteikumi/OUCH-201605_lv.pdf [Accessed: January 25, 2017]. (in Latvian).Search in Google Scholar

[2] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4” Lecture Notes in Computer Science, pp. 1-24, 2001. https://doi.org/10.1007/3-540-45537-x_110.1007/3-540-45537-X_1Search in Google Scholar

[3] Wi-Fi Alliance, “Wi-Fi Protected Access: Strong, standards-based, interoperable security for today’s Wi-Fi networks,” White paper, University of Cape Town, 2003. [Online]. Available: http://www.ansvb.com/Docs/Whitepaper_Wi-Fi_Security4-29-03.pdf [Accessed: May 5, 2017].Search in Google Scholar

[4] K. Benton, “The evolution of 802.11 wireless security,” Informatics- Spring, 2010. [Online]. Available: http://homes.soic.indiana.edu/ktbenton/research/benton_wireless.pdf [Accessed: January 25, 2017].Search in Google Scholar

[5] J. R. Vacca, Computer and Information Security Handbook. Morgan Kaufmann, 2007, pp. 172-173.Search in Google Scholar

[6] E. Tews, R.-P. Weinmann, and A. Physkin, “Breaking 104 bit WEP in less than 60 seconds,” in Cryptology ePrint Archive, Report 2007/120 [Online]. Available: Cryptology ePrint Archive http://eprint.iacr.org/2007/120 [Accessed: January 25, 2017].Search in Google Scholar

[7] Wi-Fi Alliance [Online]. Available: http://www.wi-fi.org/ [Accessed: May 5, 2017].Search in Google Scholar

[8] E. Tews and M. Beck, “Practical attacks against WEP and WPA” in Proceedings of the second ACM conference on Wireless network security - WiSec’09, pp. 79-86, 2009. https://doi.org/10.1145/1514274.151428610.1145/1514274.1514286Search in Google Scholar

[9] O. Nakhila, A. Attiah, Y. Jinz, and C. Zoux, “Parallel Active Dictionary Attack on WPA2-PSK Wi-Fi Networks,” MILCOM 2015 - 2015 IEEE Military Communications Conference, October 26-28, 2015, Tampa, FL, USA. https://doi.org/10.1109/milcom.2015.735752010.1109/MILCOM.2015.7357520Search in Google Scholar

[10] Wi-Fi Alliance. “Product finder” [Online]. Available: http://www.wifi.org/product-finderresults?sort_by=default&sort_order=desc&certifications=39 [Accessed: January 25, 2017].Search in Google Scholar

[11] S. Viehböck, “Brute forcing Wi-Fi Protected Setup” [Online]. Available: https://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf [Accessed: January 25, 2017].Search in Google Scholar

[12] “DSS ITSEC 2016: Cyber, Connected Things and Insecurity: The Largest Cyber Security Event in Baltics,” 2016. [Online]. Available: https://www.dssitsec.eu/ [Accessed: May 5, 2017].Search in Google Scholar

[13] “WIFI pētījums. Atvērto bezvadu tīklu drošības riski - Wi-Fi research. Security risks of open wireless networks,” Oct. 27, 2015. [Online] Available: https://blogs.squalio.com/2015/10/27/wifi-petijums-atvertobezvadu-tiklu-drosibas-riski/ [Accessed: January 25, 2017]. (in Latvian).Search in Google Scholar

[14] “Lattelecom vēsture - History of Lattelecom” [Online]. Available: https://www.lattelecom.lv/par-lattelecom/par-mums/vesture [Accessed: January 25, 2017]. (in Latvian).Search in Google Scholar

[15] “Wardrive in Berlin” [Online]. Available: http://www.gehaxelt.in/blog/wardrive-in-berlin/ [Accessed: May 5, 2017]. (in German).Search in Google Scholar

[16] S. Helme, “WiFi (in)Security - Is your network on the map and is it secure?” [Online]. Available: https://scotthelme.co.uk/wifi-insecuritywifi-map/ [Accessed: May 5, 2017].Search in Google Scholar

[17] A. Gostev and R. Schouwenberg. “War-driving in Germany - CeBIT2006” [Online]. Available: https://securelist.com/analysis/36076/war-driving-in-germanycebit2006/ [Accessed: May 5, 2017].Search in Google Scholar

[18] “Where to find us” [Online]. Available: http://coffee-inn.lv/#find [Accessed: January 25, 2017].Search in Google Scholar

[19] “Map of Lattelecom Wi-Fi” [Online]. Available: https://wifi.1188.lv/ [Accessed: January 25, 2017]. (in Latvian).Search in Google Scholar

[20] “WiGLE Statistics” [Online]. Available: https://wigle.net/stats [Accessed: January 28, 2017].Search in Google Scholar

[21] “DistroWatch: Kali Linux” [Online]. Available: https://distrowatch.com/table.php?distribution=kali [Accessed: May 5, 2017].Search in Google Scholar

[22] “Airodump-ng documentation” [Online]. Available: https://www.aircrack-ng.org/doku.php?id=airodump-ng [Accessed: January 25, 2017].Search in Google Scholar

[23] “Aircrack-ng documentation” [Online]. Available: https://www.aircrackng.org/doku.php?id=aircrack-ng [Accessed: January 25, 2017].Search in Google Scholar

[24] IEEE Standarts Association, “IEEE 802.11i-2004: Medium Access Control (MAC) Security Enhancements” [Online]. Available: http://standards.ieee.org/getieee802/download/802.11i-2004.pdf [Accessed: May 5, 2017].Search in Google Scholar

[25] A. Tsitroulis, D. Lampoudis, and E. Tsekleves, “Exposing WPA2 security protocol vulnerabilities,” International Journal of Information and Computer Security, vol.6, no.1, pp. 93-107, 2014. https://doi.org/10.1504/ijics.2014.05979710.1504/IJICS.2014.059797Search in Google Scholar

[26] “Brute-Force WPA/WPA2 via GPU” [Online]. Available: https://nullbyte.wonderhowto.com/how-to/brute-force-wpa-wpa2-via-gpu-0170474/ [Accessed: May 5, 2017].Search in Google Scholar

[27] “FLUXION” [Online]. Available: https://github.com/wi-fianalyzer/fluxion [Accessed: May 5, 2017].Search in Google Scholar

eISSN:
2255-8691
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
2 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Informationstechnik, Projektmanagement, Softwareentwicklung, Künstliche Intelligenz