Document Type

Conference Proceeding

Publisher

CSREA Press

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Security Science

RAS ID

14358

Comments

This article was originally published as: Aked, S. , Bolan, C. M., & Brand, M. W. (2012). A Proposed Method for Examining Wireless Device Vulnerability to Brute Force Attacks via WPS External Registrar PIN Authentication Design Vulnerability. Proceedings of International Conference on Security and Management. (pp. 691-694). Las Vegas, Nevada, USA. CSREA Press. Original article available here

Abstract

Wi-Fi Protected Setup (WPS) is a certification scheme introduced in 2007 to ensure that wireless SOHO (Small Office, Home Office) and home networks could be connected to in a trusted, yet user friendly manner. Recently, WPS was shown to have a design and implementation flaw which makes the feature highly susceptible to attack. Although open-source tools have been written and released, no formal testing methodology has been developed. This research presents a proposed method for the testing of this vulnerability in a measured and systematic way.

Share

 
COinS