Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools

Alberto Acosta-López, Elver Yesid Melo-Monroy, Pablo Andrés Linares-Murcia


Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.


data security; information security; intrusion detection; wireless security

Full Text:



D. Lemos, “El secreto en la nube,” [Online]. Available: http://www.digiware.net/?q=es/blog/el-secreto-de-la-nube [Accessed Apr. 30, 2017].

R. Juan, “Redes inalámbricas Principales protocolos,” 2011. [Online]. Available: http://deredes.net/redes-inalambricas-principales-protocolos/ [Accessed Apr. 28, 2017].

A. Hassan Adnan, “A comparative study of WLAN security protocols: WPA, WPA2,” in International Conference on advances in Eletronical Engineering (IEEE), Dhaka, Bangladesh, 2015.

Intel, “Wi-Fi diferentes protocolos y velocidades de datos,” 2017. [Online] Aviable: http://www.intel.la/content/www/xl/es/support/articles/000005725/network-and-i-o/wireless-networking.html [Accessed May. 20 2017].

IEEE “802.11-2016 - IEEE Standard for information technology,” 2016. [Online]. Available: http://ieeexplore.ieee.org/document/7786995/ [Accessed May 21, 2017].

J. Ruz Maluenda, B. Riveros Vasquez, and A. Varas Escobar, “Redes WPA/WPA2,” [Online] Available: http://profesores.elo.utfsm.cl/~agv/elo322/1s12/project/reports/RuzRiverosVaras.pdf [Accessed May. 20, 2017].

Ciberseguridad wikia, “Ataques TCP/IP,” 2013. [Online] Available: http://es.ciberseguridad.wikia.com/wiki/Ataques_TCP/IP [Accessed May. 24, 2017].

S. Dietrich, D. Dittrich, and P. Reiher. Denial of Service. Attack and Defense Mechanisms. NJ: Prentice Hall. 2004.

Wifislax “Presentación,” [Online] Available: http://www.wifislax.com [Accessed Jun. 4, 2017].

A. Maroto, “Crackeando Redes Wi-Fi: WPA y WPA2 –PSK,” 2016 [Online] Available: http://www.tic.udc.es/~nino/blog/lsi/reports/wpa.pdf [Accessed Jan. 20, 2017].

Aircrack-ng, “Introduction,” [Online] Available: http://www.aircrack-ng.org/doku.php [Accessed Mar. 27, 2017].

VMware, “Workstation pro,” [Online] Available: http://www.vmware.com/co/products/workstation.html [Accessed Mar, 30 2017].

DOI: https://doi.org/10.19053/01211129.v27.n47.2018.7748

Article Metrics

Abstract Views

Metrics Loading ...


  • There are currently no refbacks.

Copyright (c) 2018 Revista Facultad de Ingeniería

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.


Revista Facultad de Ingeniería (Rev. Fac. Ing.) - ISSN: 0121-1129 - ISSN: 2357-5328 (Online)

Indexed and registered by: Emerging Sources Citation IndexSciELORedalycPublindex(Categoría A2)REDIBDOAJDialnetSHERPA/RoMEOLatindex.



Licencia de Creative Commons

This work is licensed under a Creative Commons Attribution 4.0 International

Sede Central Tunja–Boyacá–Colombia
Avenida Central del Norte 39-115
PBX: (57+8) 7405626
portalweb@uptc.edu.co Comentarios de este sitio
Horario de atención y servicio telefónico
8:00 a.m. a 12:00 m y 2:00 p.m a 6:00 p.m.

Atención al Ciudadano
Línea Gratuita: 01 8000 942024
Tel: (57+8) 7428263
Notificaciones Judiciales
Notificaciones de aviso

Institución de Educación Superior sujeta a inspección y vigilancia por el Ministerio de Educación Nacional
Sistema OJS - Metabiblioteca |