Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools

Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools

Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools

Facultad de ingeniería



Bibliographic data

Translated title: Evaluación de seguridad en protocolo de red inalámbrico WPA2-PSK usando las herramientas Linset y Aircrack-ng
Journal Title: Facultad de ingeniería
First author: Alberto Acosta-López
Other Authors: Elver Yesid Melo-Monroy;
Pablo Andrés Linares-Murcia
Palabras clave:
Traslated Keywords:
Language: English
Get full text: https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748
Resource type: Journal Article
Source: Facultad de ingeniería; Vol 27, No 47 (Year 2018).
DOI: http://dx.doi.org/10.19053/01211129.v27.n47.2018.7748
Publisher: Universidad Pedagógica y Tecnológica de Colombia
Usage rights: Reconocimiento (by)
Categories: Physical/Engineering Sciences --> Engineering, Multidisciplinary

Statistical data

  • Views
  • Consultations
  • Citation style
  • Share
  • Export record
  • Favourites
Bibliography: D. Lemos, “El secreto en la nube,” [Online]. Available: http://www.digiware.net/?q=es/blog/el-secreto-de-la-nube [Accessed Apr. 30, 2017].

R. Juan, “Redes inalámbricas Principales protocolos,” 2011. [Online]. Available: http://deredes.net/redes-inalambricas-principales-protocolos/ [Accessed Apr. 28, 2017].

A. Hassan Adnan, “A comparative study of WLAN security protocols: WPA, WPA2,” in International Conference on advances in Eletronical Engineering (IEEE), Dhaka, Bangladesh, 2015.

Intel, “Wi-Fi diferentes protocolos y velocidades de datos,” 2017. [Online] Aviable: http://www.intel.la/content/www/xl/es/support/articles/000005725/network-and-i-o/wireless-networking.html [Accessed May. 20 2017].

IEEE “802.11-2016 - IEEE Standard for information technology,” 2016. [Online]. Available: http://ieeexplore.ieee.org/document/7786995/ [Accessed May 21, 2017].

J. Ruz Maluenda, B. Riveros Vasquez, and A. Varas Escobar, “Redes WPA/WPA2,” [Online] Available: http://profesores.elo.utfsm.cl/~agv/elo322/1s12/project/reports/RuzRiverosVaras.pdf [Accessed May. 20, 2017].

Ciberseguridad wikia, “Ataques TCP/IP,” 2013. [Online] Available: http://es.ciberseguridad.wikia.com/wiki/Ataques_TCP/IP [Accessed May. 24, 2017].

S. Dietrich, D. Dittrich, and P. Reiher. Denial of Service. Attack and Defense Mechanisms. NJ: Prentice Hall. 2004.

Wifislax “Presentación,” [Online] Available: http://www.wifislax.com [Accessed Jun. 4, 2017].

A. Maroto, “Crackeando Redes Wi-Fi: WPA y WPA2 –PSK,” 2016 [Online] Available: http://www.tic.udc.es/~nino/blog/lsi/reports/wpa.pdf [Accessed Jan. 20, 2017].

Aircrack-ng, “Introduction,” [Online] Available: http://www.aircrack-ng.org/doku.php [Accessed Mar. 27, 2017].

VMware, “Workstation pro,” [Online] Available: http://www.vmware.com/co/products/workstation.html [Accessed Mar, 30 2017].