Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

A Study on 802.11 Wireless Routers Hacking Techniques and Security Encryption Levels

Author : Amith Raj 1 Sneha H.R 2 Bindu Bhargavi S.M 3 Rekha Jayaram 4

Date of Publication :7th May 2016

Abstract: A device that performs both the functions of routing and the functions of a wireless access point is called as a wireless router. It can also be used to provide access to the private computer network or Internet. A set of Media Access Control(MAC) and Physical Layer specifications for implementing wireless local area network (WLAN) computer communication is defined in IEEE 802.11. It supports different connection types like PPPOE, Static IP address, Dynamic IP address and Bridge as provided by the ISP. These devices can also be used as modems and WiFi Router protected with a password. There are various WLAN encryption techniques like WEP, WPA, WPA-2(PSK). But all of these encryptions are vulnerable and can be hacked using certain softwares and techniques. In this paper, a number of hacking techniques using softwares like Aircrack, WiFite are explained for research purpose. This paper also discusses about setting up a secure WiFi router using different encryption techniques with combination of security features of routers like Mac Address filtering and Firewalls to protect from hackers and attackers. The primary purpose of this research is to demonstrate a brief idea on ethical hacking and provide sufficient security for home and enterprise network.

Reference :

  1. [1] 2010 2nd International Conference on Education Technology and Computer (ICETC). Wireless Hacking - A WiFi Hack by Cracking WEP. S Vinjosh Reddy, K SaiRamani, K Rijutha, Sk Mohammad Ali, CR. Pradeep Reddy

    [2] Performance evaluation of the security in wireless local area networks (WiFi). Nada CHENDEB, Bachar El HASSAN and Hossam AFIFI

    [3] Security Enhanced IEEE 802.1x Authentication Method for WLAN Mobile Router. Keun Young Park, Yong Soo Kim, Juho Kim

    [4] 2009 International Conference on Signal Processing Systems, Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA), ARASH HABIBI LASHKARI, MASOOD MANSOORI, AMIR SEYED DANESH

    [5] 2011 Panhellenic Conference on Informatics. Real-life paradigms of wireless network security attacks, I. P. Mavridis, A.-I. E. Androulakis, A. B. Ηalkias, Ph. Mylonas

    [6] https://en.m.wikipedia.org/wiki/Router_(computing)- Router (computing)

    [7] http://searchmobilecomputing.techtarget.com/definition/ wireless-router- Wireless Router

    [8] https://en.m.wikipedia.org/wiki/IEEE_802.11 - IEEE 802.11

    [9] http://whatismyipaddress.com/ppp-pppoe - What is PPP and PPPoE?

    [10] http://searchwindevelopment.techtarget.com/definition /static-IP-address-dynamic-IP-address-static IP address/dynamic IP addres

    [11] http://cecs.wright.edu/~pmateti/InternetSecurity/Lectur es/WirelessHacks/Mateti-WirelessHacks.htm-Hacking Techniques in Wireless Networks

    [12] https://www.techopedia.com/definition/18091/bruteforce-attack - Brute Force Attack

    [13] http://smallbusiness.chron.com/difference-betweenhardware-firewall-software-firewall-65471.html -The Difference Between a Hardware Firewall and a Software Firewall

    [14] http://www.howtogeek.com/167783/htg-explains-thedifference-between-wep-wpa-and-wpa2-wirelessencryption-and-why-it-matters/ - HTG Explains: The Difference Between WEP, WPA, and WPA2 Wireless Encryption (and Why It Matters)

    [15] http://www.howtogeek.com/204458/why-youshouldn%E2%80%99t-use-mac-address-filtering-on-yourwi-fi-router/-Why You Shouldn’t Use MAC Address Filtering On Your Wi-Fi Router

    [16] https://en.m.wikipedia.org/wiki/Blacklist_(computing) - Blacklist (computing)

    [17] International Journal of Advanced Research in Computer Science and Software Engineering, Ethical Hacking: A Security Technique, Sonal Beniwal, Sneha

    [18] Hacking Techniques in Wireless Networks, Prabhaker Mateti, Department of Computer Science and Engineering, Wright State University, Dayton, Ohio 45435-0001

    [19] http://www.rootsh3ll.com/2015/10/rwsps-automatedwifi-wep-wpa2-wps-cracking-ch4/-RWSPS: Automated WiFi Cracking [ch4]

    [20] http://himanshunegi.in/hack-wifi-password-wifite/ - How to Hack WiFi Password? Cracking WEP, WPA/WPA2, WPS with Wifite!

    [21] http://www.whoisonmywifi.com/How_To_Make_A_ Wireless_Network_Secure.pdf - How to Make a Wireless Network Secure

    [22] Hacking Techniques in Wireless Networks, Prabhaker Mateti, Department of Computer Science and Engineering, Wright State University, Dayton, Ohio

    [23] 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) WLAN Security System based on the 802.1 and AES, Dushuqin, Qin Yi

    [24] Securing Wi-Fi Networks, Kjell J. Hole, Erlend Dyrnes, Per Thorsheim


Recent Article