Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Apparatus and method for detecting vulnerability of WPA2 protocol

A detection device and detection method technology, applied in the direction of security devices, electrical components, wireless communications, etc., can solve the problems of personal information data being stolen, threats to personal information security, etc., and achieve the goal of improving detection efficiency, convenience, and accuracy Effect

Active Publication Date: 2018-12-11
ZHEJIANG UNIV
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And these vulnerabilities may exist in all smart devices with wireless network connection functions (including smart phones, tablet computers, etc.), if the WPA2 protocol protection of the smart device under test is cracked, the user's network access information may be monitored, There is a risk of their personal information being stolen, threatening the security of personal information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for detecting vulnerability of WPA2 protocol
  • Apparatus and method for detecting vulnerability of WPA2 protocol
  • Apparatus and method for detecting vulnerability of WPA2 protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] Embodiment 1, the detection device (hereinafter referred to as detection device for short) of WPA2 protocol vulnerability, such as Figure 4 As shown, it includes a control module 1 , a detection module 2 , a verification module 3 and a monitoring module 4 . The control module 1 is connected with the detection module 2, the verification module 3 and the monitoring module 4 respectively, and the control module 1 also communicates with the computer through the USB interface. The detection module 2 and the monitoring module 4 are respectively connected to the smart device under test through a network antenna, that is, the detection module 2 and the monitoring module 4 can transmit and receive wireless network signals. The monitoring module 4 is connected to the verification module 3 with signals.

[0091] Note: Figure 4 The arrows in indicate the direction of signal transmission, image 3 The dotted line in indicates that the signal is transmitted through the wireless ne...

Embodiment 2

[0097] Embodiment 2, the detection method of WPA2 protocol vulnerability, such as Figure 5 and Image 6 As shown, the detection device in Embodiment 1 triggers the vulnerability of the smart device to be tested by means of a message replay attack, so as to detect whether the smart device to be tested has a WPA2 protocol vulnerability.

[0098] like Figure 5 As shown, the detection method for WPA2 protocol vulnerability using the detection device of embodiment 1 specifically includes the following steps:

[0099] Note: Figure 5 The arrows in the middle indicate the order of the steps, and the notes on the arrows indicate the requirements and instructions for the execution of the steps.

[0100] The following is a detailed description of the entire detection method according to the process:

[0101] S1. Start detection device:

[0102] The computer and the detection device are connected through a USB interface, and the staff configures the access point name and password ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a device for detecting the vulnerability of a WPA2 protocol, which comprises a control module, a detection module, a verification module and a monitoring module. The control module is used for controlling and scheduling the detection module, the verification module and the monitoring module. The detection module is used for triggering the fragile point of the intelligent device to be tested. The monitoring module is used for monitoring and storing the communication data of the channel where the intelligent equipment to be tested is located. The verification module is used for extracting the data packets monitored by the monitoring module and verifying whether the WPA2 protocol fragile point exists in the intelligent device under test by using the data packets. The invention also provides a method for detecting the vulnerability of a WPA2 protocol by using the detection device, by monitoring the data of the channel where the intelligent device to be tested communicates with the detection device in wireless network, the data packet obtained by monitoring is analyzed, and according to the analysis result, whether the WPA2 fragile point of the intelligent deviceis triggered or not is judged, so as to ensure that the detection result is correct.

Description

technical field [0001] The invention relates to the field of wireless communication networks, in particular to a detection device and method for WPA2 protocol vulnerability. Background technique [0002] With the development of wireless network technology, wireless network has gradually become the main network access method for people, and the application of routers and Wi-Fi networks is becoming more and more popular. Different from wired networks, wireless networks transmit information in an open medium, so within a limited range, devices with the same protocol standard can receive data packets. Therefore, data security, confidentiality and authentication association methods are the core of the entire wireless network connection. [0003] In 1997, the Institute of Electrical and Electronics Engineers (Institute of Electrical and Electronics Engineers, hereinafter referred to as IEEE) formulated the first version of the standard for wireless local area networks—IEEE 802.11...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/02H04W12/06H04W24/08H04W12/122
CPCH04W12/00H04W12/02H04W12/06H04W24/08
Inventor 蒋云帆刘鹏
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products