DC Field | Value | Language |
dc.contributor.author | Boretskyy, Taras | |
dc.date.accessioned | 2020-02-18T08:58:33Z | - |
dc.date.available | 2020-02-18T08:58:33Z | - |
dc.date.created | 2019-02-26 | |
dc.date.issued | 2019-02-26 | |
dc.identifier.citation | Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6. | |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/45644 | - |
dc.description.abstract | In this paper, we discuss the most popular
attacks on personal Wi-Fi networks, offer some
improvements to the hacking process and possible methods
of protection. | |
dc.format.extent | 1-6 | |
dc.language.iso | en | |
dc.publisher | Lviv Politechnic Publishing House | |
dc.relation.ispartof | Advances in Cyber-Physical Systems : scientific journal, 1 (4), 2019 | |
dc.relation.uri | http://www.aircrack-ng.org/ | |
dc.relation.uri | http://csrc.nist.gov/ | |
dc.relation.uri | http://www.haveibeenpwned.com/ | |
dc.relation.uri | http://www.3wifi.stascorp.com/ | |
dc.subject | Wi-Fi security | |
dc.subject | WPA2-PSK | |
dc.subject | dictionary attack | |
dc.subject | hacking | |
dc.subject | 4-way handshake | |
dc.subject | PBKDF2 authentication protocol | |
dc.title | The methods of protection and hacking of modern WI-FI networks | |
dc.type | Article | |
dc.rights.holder | © Національний університет “Львівська політехніка”, 2019 | |
dc.rights.holder | © Boretskyi T., 2019 | |
dc.contributor.affiliation | Lviv Polytechnic National University | |
dc.format.pages | 6 | |
dc.identifier.citationen | Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6. | |
dc.relation.references | 1. S. Fluhrer, I. Mantin, and A. Shamir. “Weaknesses in the key scheduling algorithm of RC4”, International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24. | |
dc.relation.references | 2. M. Vanhoef and E. Ronen. “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”, p. 1–16. | |
dc.relation.references | 3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018]. | |
dc.relation.references | 4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8. | |
dc.relation.references | 5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018] | |
dc.relation.references | 6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004. | |
dc.relation.references | 7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018]. | |
dc.relation.references | 8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018]. | |
dc.relation.referencesen | 1. S. Fluhrer, I. Mantin, and A. Shamir. "Weaknesses in the key scheduling algorithm of RC4", International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24. | |
dc.relation.referencesen | 2. M. Vanhoef and E. Ronen. "Dragonblood: A Security Analysis of WPA3’s SAE Handshake", p. 1–16. | |
dc.relation.referencesen | 3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018]. | |
dc.relation.referencesen | 4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8. | |
dc.relation.referencesen | 5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018] | |
dc.relation.referencesen | 6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004. | |
dc.relation.referencesen | 7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018]. | |
dc.relation.referencesen | 8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018]. | |
dc.citation.volume | 4 | |
dc.citation.issue | 1 | |
dc.citation.spage | 1 | |
dc.citation.epage | 6 | |
dc.coverage.placename | Львів | |
Appears in Collections: | Advances In Cyber-Physical Systems. – 2019. – Vol. 4, No. 1
|