[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
:: Volume 9, Issue 1 (8-2020) ::
3 2020, 9(1): 38-31 Back to browse issues page
A survey on the wi-fi wireless network systems penetration approaches
HamidReza Mohammadi
Islamic Azad University, Lahijan Branch
Abstract:   (1289 Views)
Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipment are utilizing the most common coding approaches to exchange data on the network. As such, if a person could enter this network, he would be able to attack against the users connected to network. In this essay, the penetrating methods in wi-fi wireless network applying the WEP and WPA WPA2 coding protocols would be investigated which are playing the most important role in local and organizational wireless communication. However, the WPA3 is suggested in order to eliminate all the security problems, yet not all the communication instruments in Iran are equipped with this coding system. On the other side, the WEP protocol is the first mostly used to be attacked followed by the first and second versions of WPA.
Keywords: Penetration approaches, Wi-fi networks, Penetration test, WPA2, WPA &WEP
Full-Text [PDF 641 kb]   (296 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2021/01/19 | Accepted: 2021/05/1 | Published: 2021/05/10
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Mohammadi H. A survey on the wi-fi wireless network systems penetration approaches. 3. 2020; 9 (1) :38-31
URL: http://monadi.isc.org.ir/article-1-181-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 9, Issue 1 (8-2020) Back to browse issues page
دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.04 seconds with 30 queries by YEKTAWEB 4331