International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Volume3,May 2016,

Topic : A Study on 802.11 Wireless Routers Hacking Techniques and Security Encryption Levels

Authors:Amith Raj || Sneha H.R, Bindu Bhargavi S.M, Rekha Jayaram

Abstract:A device that performs both the functions of routing and the functions of a wireless access point is called as a wireless router. It can also be used to provide access to the private computer network or Internet. A set of Media Access Control(MAC) and Physical Layer specifications for implementing wireless local area network (WLAN) computer communication is defined in IEEE 802.11. It supports different connection types like PPPOE, Static IP address, Dynamic IP address and Bridge as provided by the ISP. These devices can also be used as modems and WiFi Router protected with a password. There are various WLAN encryption techniques like WEP, WPA, WPA-2(PSK). But all of these encryptions are vulnerable and can be hacked using certain softwares and techniques. In this paper, a number of hacking techniques using softwares like Aircrack, WiFite are explained for research purpose. This paper also discusses about setting up a secure WiFi router using different encryption techniques with combination of security features of routers like Mac Address filtering and Firewalls to protect from hackers and attackers. The primary purpose of this research is to demonstrate a brief idea on ethical hacking and provide sufficient security for home and enterprise network..

Keywords: Router, Security, Encryption, WPA -2, Aircrack, WEP, WPA, Mac Filtering, Firewalls.

Download Paper

DOI: 01.1617/vol3iss5pid243

Related Articles

Design and Implementation of nRF Based Smart Home System Using IoT

Authors: J.Krishna Chaithanya || Dr. T. Ramashri

Doi : 01.1617/vol4iss3pid024

Volume4 ,March 2016.

Real-Time Vehicle Tracking Using GSM & GPS with Location Display on Google Maps Using Raspberry Pi

Authors: J.Krishna Chaithanya || Dr. T. Ramashri

Doi : 01.1617/vol4iss3pid025

Volume4 ,March 2016.

Obstacle Avoiding Intelligent Robot

Authors: Prof.S. B. Mandlik || Miss.Kshirsagar Snehal D , Miss. Gaikwad Jyoti B , Miss.Wagh Varsha S , Miss. Ingale komal M

Doi : 01.1617/vol4iss3pid026

Volume4 ,March 2016.

Increased Learning In Retinal Blood Vessel Segmentation Approach Based on Fuzzy-C Means Clustering and Mathematical Morphology

Authors: Naluguru Udaya Kumar || Tirumala Ramashri

Doi : 01.1617/vol4iss3pid027

Volume4 ,March 2016.

A Review on Atmospheric Effects on Free Space Optical Link

Authors: Shaik.Taj Mahaboob || A.Sree Madhuri

Doi : 01.1617/vol4iss3pid028

Volume4 ,March 2016.

Efficient Medical Image Compression based on Region of Interest

Authors: S. Muni Rathnam || T. Ramashri

Doi : 01.1617/vol4iss3pid029

Volume4 ,March 2016.

CBIR Based Crack Detection System for Surface Traffic

Authors: Dr.Abraham Mathew || Dr.S. Saravanan, Dr. P. Mohanaiah

Doi : 01.1617/vol4iss3pid030

Volume4 ,March 2016.

IOT Based Digital Notice Board

Authors: K.Dinesh || M.Siva Ramakrishna

Doi : 01.1617/vol4iss3pid031

Volume4 ,March 2016.

Automatic Monitoring and Controlling of Greenhouse System using Zigbee

Authors: G. Hima Bindu || K. Lokesh Krishna , K. Hemalatha

Doi : 01.1617/vol4iss3pid032

Volume4 ,March 2016.

Hybrid Image Classification using ACO with Fuzzy Logic for Textured and Non-Textured Images

Authors: Subba Rao K || Dr. Sambasivarao N , Dr. Sammulal P

Doi : 01.1617/vol4iss3pid033

Volume4 ,March 2016.


Editor Image

Dr.Zhongfu Tan
National Professor,
North China Electric Power University,

View more


ISSN(Online): 2394-6849

Google Scholar Profile

Thomson Reuters ID : q-6288-2016.
ORCiD Research ID : 0000-0001-9540-6799

All Issues


Copy-Right Form Paper Template


Journal Code : IJERECE
Electronic ISSN : 2394-6849
Impact Factor : 3.689
Frequency : monthly
Contact :