Review on wireless security protocols (WPA2 & WPA3)
Wireless technologies by virtue of supporting essential life activities and enabling communication have become one of the key components of every individual and organization's life. Wi-Fi has many security protocols. Despite multiple Wi-Fi security standards, hackers use Wi-Fi cracking tools to...
Published in: | Инноватика-2021 : сборник материалов XVII Международной школы-конференции студентов, аспирантов и молодых ученых, 22-23 апреля 2021 г., г. Томск, Россия С. 160-163 |
---|---|
Main Author: | |
Other Authors: | |
Format: | Book Chapter |
Language: | English |
Subjects: | |
Online Access: | http://vital.lib.tsu.ru/vital/access/manager/Repository/koha:000846374 Перейти в каталог НБ ТГУ |
Summary: | Wireless technologies by virtue of supporting essential life activities and enabling communication have become one of the key components of every individual and organization's life. Wi-Fi has many security protocols. Despite multiple Wi-Fi security standards, hackers use Wi-Fi cracking tools to abuse wireless communications. This paper mostly will focus on the WPA2 protocol, which is largely in use nowadays, and its vulnerabilities. In addition, will discuss some key features of the WPA3 protocol. |
---|---|
Bibliography: | Библиогр.: 12 назв. |
ISBN: | 9785936296710 |