Document Type
Conference Proceeding
Publisher
CSREA Press
Faculty
Faculty of Computing, Health and Science
School
School of Computer and Security Science
RAS ID
14358
Abstract
Wi-Fi Protected Setup (WPS) is a certification scheme introduced in 2007 to ensure that wireless SOHO (Small Office, Home Office) and home networks could be connected to in a trusted, yet user friendly manner. Recently, WPS was shown to have a design and implementation flaw which makes the feature highly susceptible to attack. Although open-source tools have been written and released, no formal testing methodology has been developed. This research presents a proposed method for the testing of this vulnerability in a measured and systematic way.
Access Rights
free_to_read
Comments
This is an Author's Accepted Manuscript of: Aked, S. , Bolan, C. M., & Brand, M. W. (2012). A Proposed Method for Examining Wireless Device Vulnerability to Brute Force Attacks via WPS External Registrar PIN Authentication Design Vulnerability. Proceedings of International Conference on Security and Management. (pp. 691-694). Las Vegas, Nevada, USA. CSREA Press. Available here