Password generation for wireless network with using variable complication rule
DOI:
https://doi.org/10.18372/2410-7840.21.13547Keywords:
information security, threats of information security, wireless networks, protection of networks from unau-thorized access, mobile devices protection, password resilience, reduce the likelihood of password crackingAbstract
The most dangerous information lately are open Wi-Fi networks. Anyone can connect to them and perform certain malicious actions. Conditionally protected networks in public places or organizations that you can connect to can be considered dangerous, for example, know the password from an employee. One of the causes of cybernetic attacks on the resources of such networks are unsustainable passwords. Their use allows attackers to connect to specified networks and gain access to all devices connected to networks. In addition, if an unstable or standard password is used for the settings panel, then all devices are also at risk of a cyber attack, which can be carried out remotely. The use of an integrated approach by attackers for unauthorized access to wireless communication systems (by combining social engineering and data interception with the use of malware), as well as new types of cyber attacks, which allow to install malicious software on mobile devices can reduce the effectiveness of existing methods and means of protecting wireless networks. In order to avoid such and similar problems, the article proposes a way to increase the protection of wireless networks from intercepting information and influencing it by creating a password that is resistant to selection with a varying complexity rule. This method can be used to create software and hardware security tools, as well as to enhance the protection of user accounts and other security systems where a strong password is required. Considering the statistics and the calculations carried out in the work, it can be argued that the introduction of a method for generating complicated passwords will significantly increase the level of security of wireless networks.
References
А. Платоненко, "Сучасні загрози інформаційної безпеки для державних та приватних установ України", Сучасний захист інформації, №4, С. 86-90, 2015.
А. Платоненко, "Загрози інформаційної безпеки для користувачів сучасних мобільних пристроїв та засоби їх захисту", Сучасний захист інформації, №1, С. 128-132, 2017.
Л. Шувалова, "Методи захисту даних у Wi-Fi мережах" Розвиток радіотехнічного забезпечення, АСУ та зв’язку Повітряних Сил, С. 133-135.
О. Юдін, О. Весельська, "Аналіз захищеності бездротових мереж з використанням WEP-технології" Наукоємні технології, №3 (15), С. 62-66, 2012.
А. Чунарьова, О. Ярмак, "Аналіз протоколів безпеки сучасних WI-FI мереж" Nauka i studia, Т. 33, С. 94-97, 2013.
J. Doherty, Wireless and Mobile Device Security, 2016, 394 p.
А. Аносов, А. Платоненко, "Модель перехоп-лення та захист інформації в бездротових мере-жах" Сучасний захист інформації, 2017, №2, С. 90-94.
V. Lakhno, D. Kasatkin, V. Buriachok, Y. Pa-lekha, V. Saiko, V. Domrachev, "It support in decision-making with regard to infra-red grain drying management", Journal of Theoretical and Applied Information Technology, Vol. 96 №22, pp. 7587-7598.
В. Бурячок, В. Толубко, В. Хорошко, С. Толюпа, Інформаційна та кібербезпека: соціотехніч-ний аспект: підручник, за заг. ред. д-ра техн. на-ук В.Л. Бурячок, К.: ДУТ, 2015, 320 с.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).