Анализ безопасности беспроводной сети

Authors

  • Alexander Sergeevich Zakrevsky Московский политехнический университет
  • Evgenia Alexandrovna Budylina Московский политехнический университет

Keywords:

information security, digital technologies, Wi-Fi, WEP, WPA, WPA2, FMS, data transfer protocols

Abstract

The article discusses wireless network security protocols, their limitations and disad-vantages. An attack using a recovery key is also considered, and its effectiveness in reducing the av-erage number of intercept packets based on the selection of initialization vectors is demonstrated. A number of comparative experiments on ciphertext-only attacks were conducted to examine the effec-tiveness of such a technique and highlight the difficulties encountered.

Author Biographies

Alexander Sergeevich Zakrevsky, Московский политехнический университет

Студент 4 курса, направление: «Информационная безопасность автоматизированных си-стем» Московского политехнического университета

Evgenia Alexandrovna Budylina, Московский политехнический университет

Кандидат физико-математических наук, доцент кафедры «Инфокогнитивные технологии» Московского политехнического университета.

References

Akyildiz I. F, Su W, Sankarasubramaniam Y and Cayirci E. Wireless sensor networks: a survey. Computer Networks 2002; 38:393-422.

IEEE Std 802.11a. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. LAN/MAN Standards Committee of the IEEE Computer Society. 1999.

Rivest R. The RC4 encryption algorithm. RSA Data Security. 1992.

IEEE Std 802.11.Information Technology-Telecommunication and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11-Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.1997.

Edney J, William A. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Boston: Addison-Wesley Longman Publishing Co. 2003.

Ferguson N. Michael: an improved MIC for 802.11 WEP. IEEE doc. 802.11-2/020r0. 2002.

Housley R, Whiting D, Ferguson N. Alternate Temporal Key Hash. IEEE doc. 802.11-02/282r2. 2002.

Moen V, Raddum H and Hole K J. Weaknesses in the Temporal Key Hash of WPA. Mobile Computing and Communications Review, 2001. 76-83.

Borisov N, Goldberg I and Wagner, D. Intercepting mobile communications: The insecurity of 802.11. Chez MOBICOM, Rome, Italy, 2001.

Fluhrer S, Mantin I, Shamir A. Weaknesses in the key scheduling algorithm of RC4. Chez Annual Workshop on Selected Areas in Cryptography, Toronto, CA, 2001.

Published

2019-06-14

How to Cite

Zakrevsky А.С. Анализ безопасности беспроводной сети / Zakrevsky А.С., Budylina Е.А. // Русский. – 2019. – № 2 [10]. – P. 39–43.

Issue

Section

Young scientists - the search for self-determination