Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools

Main Article Content


Alberto Acosta-López
Elver Yesid Melo-Monroy
Pablo Andrés Linares-Murcia


Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.


Article Details


Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

All articles included in the Revista Facultad de Ingeniería are published under the Creative Commons (BY) license.

Authors must complete, sign, and submit the Review and Publication Authorization Form of the manuscript provided by the Journal; this form should contain all the originality and copyright information of the manuscript.

The authors who publish in this Journal accept the following conditions:

a. The authors retain the copyright and transfer the right of the first publication to the journal, with the work registered under the Creative Commons attribution license, which allows third parties to use what is published as long as they mention the authorship of the work and the first publication in this Journal.

b. Authors can make other independent and additional contractual agreements for the non-exclusive distribution of the version of the article published in this journal (eg, include it in an institutional repository or publish it in a book) provided they clearly indicate that the work It was first published in this Journal.

c. Authors are allowed and recommended to publish their work on the Internet (for example on institutional or personal pages) before and during the process.
review and publication, as it can lead to productive exchanges and a greater and faster dissemination of published work.

d. The Journal authorizes the total or partial reproduction of the content of the publication, as long as the source is cited, that is, the name of the Journal, name of the author (s), year, volume, publication number and pages of the article.

e. The ideas and statements issued by the authors are their responsibility and in no case bind the Journal.


[1] D. Lemos, “El secreto en la nube,” [Online]. Available: http://www.digiware.net/?q=es/blog/el-secreto-de-la-nube [Accessed Apr. 30, 2017].

[2] R. Juan, “Redes inalámbricas Principales protocolos,” 2011. [Online]. Available: http://deredes.net/redes-inalambricas-principales-protocolos/ [Accessed Apr. 28, 2017].

[3] A. Hassan Adnan, “A comparative study of WLAN security protocols: WPA, WPA2,” in International Conference on advances in Eletronical Engineering (IEEE), Dhaka, Bangladesh, 2015.

[4] Intel, “Wi-Fi diferentes protocolos y velocidades de datos,” 2017. [Online] Aviable: http://www.intel.la/content/www/xl/es/support/articles/000005725/network-and-i-o/wireless-networking.html [Accessed May. 20 2017].

[5] IEEE “802.11-2016 - IEEE Standard for information technology,” 2016. [Online]. Available: http://ieeexplore.ieee.org/document/7786995/ [Accessed May 21, 2017].

[6] J. Ruz Maluenda, B. Riveros Vasquez, and A. Varas Escobar, “Redes WPA/WPA2,” [Online] Available: http://profesores.elo.utfsm.cl/~agv/elo322/1s12/project/reports/RuzRiverosVaras.pdf [Accessed May. 20, 2017].

[7] Ciberseguridad wikia, “Ataques TCP/IP,” 2013. [Online] Available: http://es.ciberseguridad.wikia.com/wiki/Ataques_TCP/IP [Accessed May. 24, 2017].

[8] S. Dietrich, D. Dittrich, and P. Reiher. Denial of Service. Attack and Defense Mechanisms. NJ: Prentice Hall. 2004.

[9] Wifislax “Presentación,” [Online] Available: http://www.wifislax.com [Accessed Jun. 4, 2017].

[10] A. Maroto, “Crackeando Redes Wi-Fi: WPA y WPA2 –PSK,” 2016 [Online] Available: http://www.tic.udc.es/~nino/blog/lsi/reports/wpa.pdf [Accessed Jan. 20, 2017].

[11] Aircrack-ng, “Introduction,” [Online] Available: http://www.aircrack-ng.org/doku.php [Accessed Mar. 27, 2017].

[12] VMware, “Workstation pro,” [Online] Available: http://www.vmware.com/co/products/workstation.html [Accessed Mar, 30 2017].


Download data is not yet available.