SECURITY OF OPEN WI-FI NETWORKS

Authors

  • Dusmurodov Qodir Al’bert ugli,Haydarov Elshod Dilshod ugli Head of the Department of Information Security, Tashkent University of Information Technologies named after Muhammad Al-Khorezmi, PhD,Master's student of the Department of Cryptology, Tashkent University of Information Technologies named after Muhammad Al-Khorezmi

Keywords:

Wireless Access Protocol, Wi-Fi, WPA1, WPA2, WPA3, Fake Network, Password Cracking, Eavesdropping, Evil Twin Attack, Opportunistic Wireless Encryption, Simultaneous Peer Authentication.

Abstract

With the widespread use of open Wi-Fi networks, ensuring their security is becoming increasingly important. This article analyzes open wireless networks and their security. With the introduction of a new wireless access protocol, WPA3, the security of open networks has increased significantly. However, no changes were made to the WPA3 protocol to combat evil twin attacks, so this type of attack still poses a potential threat. This article analyzes new WPA3 technologies and protocols. Several approaches to protecting the user from evil twin attacks were also proposed. Based on the selected criteria, the best approach, the “trust from first use” method, was selected and recommendations for its use were given.

References

Wi-Fi Alliance. Certification, 2019. [Online; accessed May 23, 2019]. URL: https://www.wi-fi.org/certification.

Joeri de Ruiter. Advanced network security: Wifi security, 2018. [Lecture slides Master course Advanced Network Security from the master Cyber ​​Security].

Paramvir Bahl, Ranveer Chandra, Jitendra Padhye, Lenin Ravin dranath, Manpreet Singh, Alec Wolman, and Brian Zill. Enhancing the security of corporate wi-fi networks using dair. In Proceedings of the 4th international conference on Mobile systems, applications and services, pages 1–14. ACM, 2006.

Sharon Boyen, Stefan Santesson, Tim Polk, Russ Housley, Stephen Farrell, and Dave Cooper. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280, May 2008. URL: https://rfc-editor.org/rfc/rfc5280.txt, doi:10.17487/RFC5280.

Nancy Cam-Winget, Russ Housley, David Wagner, and Jesse Walker. Security flaws in 802.11 data link protocols. Communications of the ACM, 46(5):35–39, 2003.

CheapSSLSecurity. What is ssl tls handshake understand the process in just 3 minutes, 2019. [Online; accessed May 23, 2019]. URL: https://cheapsslsecurity.com/blog/what-is-ssl-tls-handshake-understand-the-process-in-just-3-minutes/.

Downloads

Published

2025-04-29

How to Cite

Dusmurodov Qodir Al’bert ugli,Haydarov Elshod Dilshod ugli. (2025). SECURITY OF OPEN WI-FI NETWORKS. Ethiopian International Multidisciplinary Research Conferences, 537–542. Retrieved from https://eijmr.org/conferences/index.php/eimrc/article/view/688