Security Issues with WPA
- Key shared ahead of time If users rely on a weak password or passphrase, WPA and WPA2 are still susceptible to password cracking attempts.
- Insufficient upfront secrecy
- Due to the lack of forward secrecy offered by WPA and WPA2, an adversary may be able to passively and covertly gather all packets encrypted with that PSK transmitted in the past and even in the future once they ascertain the pre-shared key.
- Tactics known as denial of service, in which an attacker overloads the network with messages, impairing the availability of network resources
- Eavesdropping is the practice of unauthorised third parties intercepting data being transferred across secure networks. Spoofing and session hijacking are methods by which an attacker obtains access to network resources and data by impersonating a legitimate user.
Wifi Protected Access (WPA)
The two security protocols and security certification programs are Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2). These are developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these protocols because of the serious weaknesses the researchers found in the previous system, Wired Equivalent Privacy (WEP).