Post Job Free

Resume

Sign in

Machine Learning Data Security

Location:
Sialkot, Punjab, Pakistan
Salary:
50000
Posted:
July 12, 2023

Contact this candidate

Resume:

Securing your Home Wi-Fi network: A Guide to Wi-Fi

protocols and Best practices

Amreen Javaid, Iqra Naeem,Ayesha Aslam

Department of Information Technology

GC Women University

Sialkot, Pakistan

adx9er@r.postjobfree.com

Abstract—A secure home network will help reduce the risk of being hacked. Wi-Fi protocols are becoming increasingly popular due to their flexibility. Wireless networks pose a threat to data security, and this paper highlights various protocols, including NS2, WEP, WPA, WPA2, and WPA3, and their weaknesses and strength. This paper also develops an intelligent, easy-to-deploy mechanism that uses machine learning techniques for accurate diagnosis of common Wi-Fi pathologies. Detecting the causes of poor performance in Wi-Fi networks. Wi-Fi 6 brings increased efficiency and security improvements, and password protection is used to prevent brute-force attacks and dictionary attacks in Wi-Fi-based IoT applications. Keywords---Data Security, Personal Networks, SAE

(Simultaneous Authentication of Equals), Wi-Fi Protected Access, TKIP (Temporal Key Integrity Protocol)

I. INTRODUCTION

Wireless networks are becoming increasingly popular, and the challenge of information security is becoming

increasingly critical. Wi-Fi technology is used to connect devices over the internet, but it can be vulnerable to hackers [1]. Wi-Fi security ensures that networks and devices connected are safe from intruders. It creates a barrier by encrypting private information.

A. Wi-Fi pathologies

1) Wi-Fi pathologies: This paper develops an

intelligent, easy to deploy mechanism that employs machine learning techniques to accurately diagnose the most common Wi-Fi pathologies.

Rate

2) Accuracy and precision: Several works have put an effort on investigating the detection and classification of the various causes of poor performance in Wi-Fi networks with the help of classification algorithms [2].

a) Best classifier algorithm: The collected data is fed to four different classification algorithms and the K- Nearest Neighbors classifier achieves almost 100%

accuracy and precision for the active probing and 95% accuracy and precision for the passive detection across the considered pathologies.

Fig. 1. Wi-Fi and internet speed measurements in May 2020 B) Wi-Fi protocols

A comparative analysis of WEP, WPA and WPA2

shows that WEP is the weakest, WPA was a

temporary solution and WPA2 is a very solid and

long-term solution [3].Based on the IEEE 802.11ax

standard, Wi-Fi 6 delivers increased overall

efficiency. Along with network improvements, Wi-Fi 6 brings important enhancements known as WPA3

regarding security both for personal and enterprise networks.

Wi-Fi technology plays a significant role in IoT based applications. SRPP is used to protect Wi-Fi-based IoT applications from brute force and dictionary attacks. II. STRENGTH AND WEAKNESSES

B. Wi-Fi protocols

1) WEP(Wired Equivalent Privacy): Wi-Fi Alliance

introduced WEP in 1997 to provide data security and privacy. It uses RC4 algorithm to encrypt plain text and integrity check value, and uses four operations to encode and send information. The RC4 algorithm generates a keystream using initialization vectors, WEP keys, Cyclic Redundancy Code (CRC) and XOR between the data

obtained from the previous step and the keystream [4]. a) Weakness: WEP does not take the problem of

managing keys into consideration and confidential key by the WEP does not enhance the security of network that’s why we upgrade WEP to WPA.

2) WPA(Wi-Fi Protected Access): WEP is a Wi-Fi

security protocol that uses temporal key integrity technique (TKIP) for encryption, Message Integrity Check

(MIC), Initialization Vector (IV), and key mixing. It also uses a hashing-based initialization-vector sequencing technique to dynamically change the encryption key. a) Weakness: WPA provides more sophisticated

data encryption and better user authentication than Wired Equivalent Privacy (WEP), the original Wi-Fi security standard. Due to WEP`s security weaknesses and because WPA uses only a subset of the IEEE 802 [5].

3) WPA(Wi-Fi Protected Access 2): WPA2 uses a part of AES (Advanced Encryption Standard) called Counter mode, Cipher Block Chaining, and Message

Authentication code (MAC) protocol (CCMP) which

helps provide both integrity and data security.WPA2 was created to be better, faster, and more robust than the original WPA.

a) Weakness: WPA2 still utilizes TKIP, it also uses the AES (Advanced Encryption Standard) algorithm, a more complex encryption protocol [6].

4) WPA(Wi-Fi Protected Access3): WPA3 is a remote

security standard that protects against brute force attacks and forward secrecy, providing a second defense line for networks with weak passwords. It eliminates cyber- attacks such as brute forcing.WPA3-Personal uses

Simultaneous Authentication of Equals (SAE) which is resistant to offline dictionary attacks and protects data even if a password is compromised. Reviewing hostapd source code and manual fuzz testing against Aps [9]. III. COMPARISON OF PROTOCOLS

TABLE I. Differentiate between protocols

1) SRP Protocol: Machine learning techniques such as Decision Trees, Random Forests, Support Vector

Machines and K-Nearest Neighbors are used to diagnose Wi-Fi networks' pathologies [7]. SRPP protects Wi-Fi- based IoT applications from brute force and dictionary attacks. The SRP protocol is used to form a known secret session key (ssK) and password PS for IoT Client Device and IoT Application server node.NS2 simulates attacks in WSN, running on various platforms.

2) NS2 Protocol): NS2 is a well known device for

mimicking wired and remote organization tasks. It gives a profoundly measured stage to wired and remote

recreations supporting different organization components, conventions, traffic, and steering types1 [8]. NS2 offers significant help for recreation of various conventions over wired and remote networks1 [10].

IV. KEY-RECOVERY ATTACKS OF 5G/6G

TABLE II. ATTACKS

Name Type Packets Year Ratio

FMS Statistical 6,000,000

WEP 64

Bits

2001 86

KOREK Statistical 20,000,000

WEP 64

Bits

2011

3

PTW Statistical 70,000,000

WEP 64

Bits

2016 1

Properties

Protocols

WEP

WPA WPA2 WPA3

Encryption

Method

RC4 RC4 with

TKIP

AES-

CCMP

AES

Encryption

Key Size

40 bits 128 bits 128 bits 128

Bits

Data

Integrity

CRC MessageInteg

rityCode

(MIC)

blockchain

High

Algor

ithm

Cipher type Stream Stream Block Block

Authenticat

ion

Shared

WPAEnterpri

se

PersonalW

PA2

EAP

Authen

tication

TABLE III: Comparative analysis

Paper Name Purpose Technique Advantages Limitations On the Employment

of Machine Learning

Techniques for

Troubleshooting WiFi

Networks

Detect the

causes of

WiFi under

performance

Active &

Passive

monitoring,

Classification

algorithms

After detecting

causes make

better steps to

make faster

your WiFi.

Limited

classificati on

algorithms

How is your Wi-Fi

connection today?

DoS attacks on

WPA3-SAE

Weaknesses

or

misconfigurat

ions of SAE

in WPA-3

Fuzz testing

technique

Awareness

about different

attacks

Seek of

weaknesse s just

one version of

WPA-3

Enhanced IoT Wi-

Fi protocol

standard’s security

using secure remote

password

Enhancing

the security

of Wi-Fi

SRP protocol

Method WiFi

to protect

using secure

password

Focus on just a

single protocol

SRP and further

studies continue

Comparative Analysis

of Security and

Privacy Protocols in

Wireless

Communication

Provide data

security and

privacy

RC4

RC4 with TKIP

AES-CCMP

AES

Focusing only

on the

encryption

strength,

Provides

better

password

authentication

Downgrade

Attacks

Side-Channel

leaks

V. CONCLUSION

In this review paper different wireless Security protocols like WEP/WPA/WPA2/WPA3 are talked about. At first

outline of WEP is given and how the attacks happen in WEP can be seen. Furthermore, the upgrades made to WPA/WPA2/WPA3 to defeat a wide range of attacks are talked about. Weaknesses of every protocol and the enhancements over the former are disscussed. Multiple classification algorithms used to detect Wi-Fi

underperformance. SRP protocol is used to form a known secret session key and password for IoT Client Device and IoT Application server node. In this way, the end of this paper is that the security issues should be painstakingly remembered while planning the wireless Security

Conventions as the programmers are finding new ways of locking in.

VI. FUTURE WORK

Future Wi-Fi Development focuses on enhancing data transfer rates and overall bandwidth, expanding coverage range, improving power efficiency, and ensuring secure and private communication over network. Security is a major focus with strong encryption methods and

authentication protocols. Affirmed 6™ into 6 GHz with Wi-Fi 6G highlights so clients can rapidly profit from this extra limit.

VII. REFERENCES

[1] L. Raghavendra, Comparative Analysis of Security and Privacy Protocols in Wireless Communication,

Department of Computer Science and Engineering,

RNSIT, India, 2022.

[2] V. S. Dr. B. Indira Reddy, Review on Wireless

Security Protocols (WEP, WPA, WPA2 & WPA3),

Department of Information Technology, Sreenidhi

Institute of Science and Technology, Hyderabad,

India, 2019.

[3] S. P. V. Y. Sandesh Jain, Ethical Hacking of IEEE 802.11 Encryption Protocols, Delhi Technological

University, Delhi,India, 2020.

[4] G. Kambourakis, How is your Wi-Fi connection

today? DoS attacks on WPA3-SAE, European

Commission, Joint Research Centre (JRC), 21027

Ispra, Italy, 2022.

[5] I. Syrigos, On the Employment of Machine Learning Techniques for Troubleshooting WiFi Networks,

USA: IEEE, 2020.

[6] H. A. Tarish, Enhanced IoT Wi-Fi protocol

standard’s security using secure remote password,

ISO, 2022.

[7] H.-K. Cho, Evolution of Wi-Fi Protected Access:, IEEE, 2021.

[8] J. V. a. N. A. Jani Suomalainen1, Security

Associations in Personal Networks:, Technical

Research Centre of Finland, 2020.

[9] K. Ramezanpour, Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective, Marconi-Rosenblatt AI/ML Innovation Laboratory, ANDRO

Computational Solutions, LLC, Rome, 13440, NY,

USA, 2023.

[10] M. Caneill, Attacks against the WiFi protocols, India, 2020.



Contact this candidate