Survey on Security Scheme and Attacking Methods of WPA/WPA2

YongLei Liu,Zhigang Jin,Ying Wang
DOI: https://doi.org/10.1109/WICOM.2010.5601275
2010-01-01
Abstract:As the critical security flaw of WEP is discovered, concern of researchers is more and more attracted by the scheme of WPA/WPA2 which includes 802.1X, authentication protocol, and TKIP and CCMP encryption algorithms. In this paper, an overview of WPA/WPA2 is supplied. And then, the vulnerabilities of WPA/WPA2 and current researches in the method of attacking WPA/WPA2 are introduced. In the last part, these researches are analyzed and concluded.
What problem does this paper attempt to address?