Security research of Wi-Fi Protected Access 3 (WPA3) standard

Authors

DOI:

https://doi.org/10.18372/2225-5036.29.17549

Keywords:

Wi-Fi, WPA2, WPA3, cybercrime, security, cryptography, defense

Abstract

Wi-Fi technology is very relevant nowadays, as wireless communication has become a necessary part of our everyday life. Wi-Fi allows you to connect to the Internet on various devices, such as smartphones, tablets, laptops, TVs, and others. In addition, Wi-Fi technology is constantly evolving and improving. New technology standards, such as 802.11ax (Wi-Fi 6), allow for improved data transfer speeds and greater resistance to interference and interference. However, with the popularity of Wi-Fi technology comes a greater threat to network security. Therefore, it is important to improve security methods and encryption algorithms for Wi-Fi networks to ensure their safety and security. The study of vulnerabilities of Wi-Fi WPA2 and WPA3 wireless communication protocols is very relevant due to the fact that wireless networks are an integral part of the modern world. Since hacker attacks on wireless networks have become widespread, researching WPA2 and WPA3 vulnerabilities is very important for ensuring the security of Wi-Fi networks. After all, WPA2 and WPA3 protocol vulnerabilities can be exploited by attackers to gain unauthorized access to the network and obtain sensitive information such as passwords and user data. This paper will cover such topics as the vulnerabilities of securing WIFI networks using WPA2 and WPA3, the main means of protection against attacks, and a comparative characterization of these two security methods.

References

Аналіз захищеності wifi мереж. URL: [Електронний ресурс] https://tech.vernadskyjournals. in. ua/ journals/2021/2_2021/part_1/18.pdf.

Web Titan Most Common Wireless Network Attacks. [Електронний ресурс] https://www. webtitan. com/blog/most-common-wireless-network-attacks/ #:~:text=Packet%20Sniffing%3A%20Interception%20of%20Unencrypted%20Traffic&text=Packet%20sniffing%20is %20one%20of,as%20those%20using%20WEP%20encryption.

Defence express Захист WIFI на передовій.

[Електронний ресурс] https://defenceua. com/minds_and_ideas/chomu_vazhlivo_maskuvati_wi_fi_na_peredovij_vkraj_vazhlivij_material_dlja_vsih_hto_na_perednomu_kraji_ta_ne_tilki-7948.html.

Небезпека Wi-Fi у публічних місцях: поради ІТ-спеціалістів. [Електронний ресурс] https: // shpal-ta.media/2020/08/12/nebezpeka-wi-fi-u-publich¬nix-miscyax-poradi-it-specialistiv/.

Typical Wi-Fi attacks Splone Blog. [Електронний ресурс] https://splone.com /blog/ 2020/ 10/ 13/ typical-wi-fi-attacks/.

Wi-Fi Security: WEP vs WPA or WPA2.

[Електронний ресурс] – https: // www.avast. com/c-wep-vs-wpa-or-wpa2.

What is KRACK? [Електронний ресурс] https://www.kaspersky.com / resource-center / definitions/krack.

Білевська О.С. Аналіз Вразливостей Програм Сертифікації WPA2 та WPA3 Мережі Wi-Fi [Електронний ресурс] – http://www.tech.vernadskyjournals. in.ua/journals/2021/3_2021/15.pdf.

Mathy Vanhoef, Eyal Ronen, Dragonblood. Analysing WPA3’s Dragonfly Handshake of WPA3 and

EAP-pwd. [Електронний ресурс] – http: // wpa3.mathyvanhoef.com.

Mathy Vanhoef, Key Reinstallion Attacks. Breaking WPA2 by forcing nonce reuse. [Електронний ресурс] – http://www.krackattacks.com.

Що таке WPA3, чим кращий за WPA2 і чи варто його вмикати. [Електронний ресурс] https://root-nation.com/ua/articles-ua/tech-ua/ua-wpa3-vs-wpa2/.

Harkins, D. The Dragonfly Key Exchange. [Електронний ресурс] https: //www. rfc-editor. org/rfc/ rfc7664.html.

Key Reinstallation Attacks. [Електронний ресурс] – https://www.krackattacks.com.

Wi-Fi in drones. [Електронний ресурс] https://dronesgator.com/need-wifi-to-fly-a-drone/.

Богданов О.С., Бурак Н.Є. Особливості захисту мережі Wi-Fi з протоколом шифрування WPA3.

[Електронний ресурс] https://sci.ldubgd. edu.ua/bitstream/123456789/9277/1/Bohdanov.pdf.

KRACK Attack Detection.

[Електронний ресурс] https://www.fing.com /news/krack-attack-detection-protection.

І.Р. Опірський, Р.В. Головчак, І.Р. Мойсійчук, Т. Балянда, і С. Гаранюк, «Проблеми та загрози безпеці іот пристроїв»// Кібербезпека: освіта, наука, техніка. Вип. 3, вип. 11. 2021. С. 31-42.

Опірський І.Р., Тютіков О.Ю. Проблематика побудови концепції «Розумного міста» // «Захист інформації». Том 2. Випуск №22. Київ: НАУ, 2020р. С. 114-119.

Published

2023-05-16