Analysis of Vulnerabilities in the Automatic Reconnection of Devices to Known Wi-Fi Networks

UDC.coleccionPublicacións UDCes_ES
UDC.endPage440es_ES
UDC.startPage433es_ES
dc.contributor.authorSantiago-Cernadas, Daniel
dc.contributor.authorVázquez-Naya, José
dc.date.accessioned2025-02-10T16:35:00Z
dc.date.available2025-02-10T16:35:00Z
dc.date.issued2024
dc.description.abstractWhile modern Wi-Fi security protocols such as WPA2-PSK and WPA3-PSK enhance encryption to protect against password cracking and packet sniffing, they may still be vulnerable to certain attacks. Specifically, under certain conditions, an attacker could spoof a legitimate access point (AP) to establish a man-in-the-middle (MitM) attack. This study investigates whether different devices are able to distinguish between legitimate and spoofed APs, and examines how they respond to such impersonation attempts. By analyzing device behavior in these scenarios, we aim to assess the effectiveness of current security measures and highlight potential vulnerabilities in Wi-Fi network reconnection mechanisms.es_ES
dc.identifier.urihttp://hdl.handle.net/2183/41131
dc.language.isoenges_ES
dc.relation.urihttps://doi.org/10.17979/spudc.9788497498913.61
dc.rightsAtribución 4.0es_ES
dc.rights.accessRightsopen accesses_ES
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectNetworkses_ES
dc.subjectAttackes_ES
dc.subjectWPA3-PSKes_ES
dc.subjectWPA2-PSKes_ES
dc.subjectWi-Fi networkes_ES
dc.subjectEncryptiones_ES
dc.titleAnalysis of Vulnerabilities in the Automatic Reconnection of Devices to Known Wi-Fi Networkses_ES
dc.typeconference outputes_ES
dspace.entity.typePublication
relation.isAuthorOfPublicationaeeb3bbf-9f99-467b-aa36-de0b911b5a94
relation.isAuthorOfPublication.latestForDiscoveryaeeb3bbf-9f99-467b-aa36-de0b911b5a94

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
XoveTIC_2024_proceedings_Parte61.pdf
Size:
569.41 KB
Format:
Adobe Portable Document Format
Description: