{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:58:06Z","timestamp":1740099486325,"version":"3.37.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030264734"},{"type":"electronic","value":"9783030264741"}],"license":[{"start":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T00:00:00Z","timestamp":1563926400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-26474-1_28","type":"book-chapter","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T08:02:44Z","timestamp":1563868964000},"page":"389-404","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Information System for Connection to the Access Point with Encryption WPA2 Enterprise"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9448-1751","authenticated-orcid":false,"given":"Lyubomyr","family":"Chyrun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4040-7588","authenticated-orcid":false,"given":"Liliya","family":"Chyrun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3421-2725","authenticated-orcid":false,"given":"Yaroslav","family":"Kis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5915-5520","authenticated-orcid":false,"given":"Lev","family":"Rybak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"key":"28_CR1","unstructured":"Harris M et al (2012) Mobile and connected device security considerations: a dilemma for small and medium enterprise business mobility?"},{"key":"28_CR2","unstructured":"Trudeau P, Laroche S (2014) U.S. Patent No. 8,885,539. U.S. Patent and Trademark Office, Washington, DC"},{"issue":"12","key":"28_CR3","first-page":"483","volume":"8","author":"A Sari","year":"2015","unstructured":"Sari A, Karay M (2015) Comparative analysis of wireless security protocols: WEP vs WPA. Inter J Commun Netw Syst Sci 8(12):483","journal-title":"Inter J Commun Netw Syst Sci"},{"issue":"1","key":"28_CR4","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1504\/IJICS.2014.059797","volume":"6","author":"A Tsitroulis","year":"2014","unstructured":"Tsitroulis A, Lampoudis D, Tsekleves E (2014) Exposing WPA2 security protocol vulnerabilities. IJICS 6(1):93\u2013107","journal-title":"IJICS"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Vanhoef M, Piessens F (2017) Key reinstallation attacks: forcing nonce reuse in WPA2. In: SIGSAC conference on computer and communications security, pp 1313\u20131328","DOI":"10.1145\/3133956.3134027"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Li J, Garuba M (2008) Encryption as an effective tool in reducing wireless LAN vulnerabilities. In: International conference on information technology: new generations, pp 557\u2013562","DOI":"10.1109\/ITNG.2008.221"},{"key":"28_CR7","unstructured":"Rumale AS, Chaudhari D (2011) IEEE 802.11 x, and WEP, EAP, WPA\/WPA2. Tech Appl 2(6):1945\u20131950"},{"key":"28_CR8","first-page":"1","volume":"612","author":"P Arana","year":"2006","unstructured":"Arana P (2006) Benefits and vulnerabilities of Wi-Fi protected access 2 (WPA2). INFS 612:1\u20136","journal-title":"INFS"},{"key":"28_CR9","unstructured":"Lashkari AH, Danesh MMS, Samadi, B (2009) A survey on wireless security protocols (WEP, WPA and WPA2\/802.11 i). In: International conference on computer science and information technology, pp 48\u201352"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Suresh L, Schulz-Zander J, Merz R, Feldmann A, Vazao T (2012) Towards programmable enterprise WLANS with Odin. In: Proceedings of the first workshop on hot topics in software defined networks, pp 115\u2013120","DOI":"10.1145\/2342441.2342465"},{"key":"28_CR11","first-page":"496","volume-title":"Communications in Computer and Information Science","author":"Mahmoud Khasawneh","year":"2014","unstructured":"Khasawneh M, Kajman I, Alkhudaidy R, Althubyani A (2014) A survey on Wi-Fi protocols: WPA and WPA2. In: International conference on security in computer networks and distributed systems. Springer, Heidelberg, pp 496\u2013511"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Robyns P, Bonn\u00e9 B, Quax P, Lamotte W (2014) Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles. In: ACM conference on security and privacy in wireless & mobile networks, pp 189\u2013194","DOI":"10.1145\/2627393.2627411"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Vanhoef M, Piessens F (2017) Key reinstallation attacks: forcing nonce reuse in WPA2. In: ACM SIGSAC conference on computer and communications security, pp 1313\u20131328","DOI":"10.1145\/3133956.3134027"},{"key":"28_CR14","unstructured":"Nussel L. (2010) The evil twin problem with WPA2-enterprise. SUSE Linux Products GmbH"},{"key":"28_CR15","unstructured":"Katz FH (2010) WPA vs. WPA2: is WPA2 really an improvement on WPA? In: Annual computer security conference, Coastal Carolina University, Myrtle Beach, SC"},{"issue":"1","key":"28_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1108\/IMCS-03-2013-0019","volume":"22","author":"AM Harris","year":"2014","unstructured":"Harris AM, Patten PK (2014) Mobile device security considerations for small-and medium-sized enterprise business mobility. Inf Manag Comput Secur 22(1):97\u2013114","journal-title":"Inf Manag Comput Secur"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Crainicu B (2008) Wireless LAN security mechanisms at the enterprise and home level. In: Novel algorithms and techniques in telecommunications, automation and industrial electronics. Springer, Dordrecht, pp 306\u2013310","DOI":"10.1007\/978-1-4020-8737-0_55"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Abo-Soliman MA, Azer MA (2017) A study in WPA2 enterprise recent attacks. In: International computer engineering conference (ICENCO), pp 323\u2013330","DOI":"10.1109\/ICENCO.2017.8289808"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Radivilova T, Hassan HA (2017) Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-enterprise. In: International conference on information and telecommunication technologies and radio electronics (UkrMiCo), pp 1\u20134","DOI":"10.1109\/UkrMiCo.2017.8095429"},{"key":"28_CR20","unstructured":"Lorente EN, Meijer C, Verdult R (2015) Scrutinizing WPA2 password generating algorithms in wireless routers. In: USENIX workshop on offensive technologies"},{"issue":"4","key":"28_CR21","first-page":"167","volume":"5","author":"SA Visan","year":"2013","unstructured":"Visan SA (2013) WPA\/WPA2 password security testing using graphics processing units. J Mob Embed Distrib Syst 5(4):167\u2013174","journal-title":"J Mob Embed Distrib Syst"},{"issue":"2","key":"28_CR22","first-page":"58","volume":"6","author":"NK Sangani","year":"2012","unstructured":"Sangani NK, Vijayakumar B (2012) Cyber security scenarios and control for small and medium enterprises. Informatica Economica 6(2):58","journal-title":"Informatica Economica"},{"key":"28_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.12.011","volume":"4","author":"A Bartoli","year":"2018","unstructured":"Bartoli A, Medvet E, Onesti F (2018) Evil twins and WPA2 Enterprise: a coming security disaster? Comput Secur 4:1\u201311","journal-title":"Comput Secur"},{"key":"28_CR24","unstructured":"Gali TAB, Amin Babiker A, Mustafa N (2015) A comparative study between WEP, WPA and WPA2 security algorithms. Int J Sci Res. ISSN 2319-7064"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Adnan AH, Abdirazak M, Sadi AS, Anam T, Khan SZ, Rahman MM, Omar MM (2015) A comparative study of WLAN security protocols: WPA, WPA2. In: International conference on advances in electrical engineering (ICAEE), pp 165\u2013169","DOI":"10.1109\/ICAEE.2015.7506822"},{"key":"28_CR26","unstructured":"Nandi S (2019) Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity. In: Distributed computing and internet technology: international conference, ICDCIT 2019, Bhubaneswar, India, vol 11319. Springer, p 422"},{"key":"28_CR27","unstructured":"Vysotska V, Fernandes VB, Emmerich M (2018) Web content support method in electronic business systems. In: CEUR workshop proceedings, vol 2136, pp 20\u201341"},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Vysotska V, Hasko R, Kuchkovskiy V (2015) Process analysis in electronic content commerce system. In: Proceedings of the international conference on computer sciences and information technologies, CSIT 2015, pp 120\u2013123","DOI":"10.1109\/STC-CSIT.2015.7325447"},{"key":"28_CR29","doi-asserted-by":"crossref","unstructured":"Naum O, Chyrun L, Kanishcheva O, Vysotska V (2017) Intellectual system design for content formation. In: Proceedings of the international conference on CSIT computer science and information technologies, pp 131\u2013138","DOI":"10.1109\/STC-CSIT.2017.8098753"},{"key":"28_CR30","unstructured":"Lytvyn V, Sharonova N, Hamon T, Vysotska V, Grabar N, Kowalska-Styczen A (2018) Computational linguistics and intelligent systems. In: CEUR workshop proceedings, vol 2136"},{"key":"28_CR31","doi-asserted-by":"crossref","unstructured":"Lytvyn V, Vysotska V (2015) Designing architecture of electronic content commerce system. In: Proceedings of the X-th international conference on computer science and information technologies, CSIT 2015, pp 115\u2013119","DOI":"10.1109\/STC-CSIT.2015.7325446"},{"key":"28_CR32","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-030-01069-0_15","volume":"871","author":"A Gozhyj","year":"2019","unstructured":"Gozhyj A, Vysotska V, Yevseyeva I, Kalinina I, Gozhyj V (2019) Web resources management method based on intelligent technologies. Adv Intell Syst Comput 871:206\u2013221","journal-title":"Adv Intell Syst Comput"},{"key":"28_CR33","doi-asserted-by":"crossref","unstructured":"Gozhyj A, Kalinina I, Vysotska V, Gozhyj V (2018) The method of web-resources management under conditions of uncertainty based on fuzzy logic. In: 2018 IEEE 13th international Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 \u2013 Proceedings, vol 1, pp 343\u2013346","DOI":"10.1109\/STC-CSIT.2018.8526761"},{"key":"28_CR34","first-page":"66","volume":"15","author":"V Lytvyn","year":"2018","unstructured":"Lytvyn V, Vysotska V, Dosyn D, Burov Y (2018) Method for ontology content and structure optimization, provided by a weighted conceptual graph. Webology 15:66\u201385","journal-title":"Webology"},{"key":"28_CR35","unstructured":"Kravets P (2010) The control agent with fuzzy logic. In: Perspective technologies and methods in MEMS design, MEMSTECH 2010, pp 40\u201341"},{"issue":"2\u201397","key":"28_CR36","doi-asserted-by":"publisher","first-page":"18","DOI":"10.15587\/1729-4061.2019.154709","volume":"1","author":"V Lytvyn","year":"2019","unstructured":"Lytvyn V, Vysotska V, Kuchkovskiy V, Bobyk I, Malanchuk O, Ryshkovets Y, Pelekh I, Brodyak O, Bobrivetc V, Panasyuk V (2019) Development of the system to integrate and generate content considering the cryptocurrent needs of users. East-Eur J Enterp Technol 1(2\u201397):18\u201339","journal-title":"East-Eur J Enterp Technol"},{"key":"28_CR37","doi-asserted-by":"crossref","unstructured":"Lytvyn V, Kuchkovskiy V, Vysotska V, Markiv O, Pabyrivskyy V (2018) Architecture of system for content integration and formation based on cryptographic consumer needs. In: 2018 IEEE 13th international scientific and technical conference on computer sciences and information technologies, CSIT 2018 \u2013 Proceedings, vol 1, pp 391\u2013395","DOI":"10.1109\/STC-CSIT.2018.8526669"},{"key":"28_CR38","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/978-3-030-01069-0_24","volume":"871","author":"B Rusyn","year":"2019","unstructured":"Rusyn B, Lytvyn V, Vysotska V, Emmerich M, Pohreliuk L (2019) The virtual library system design and development. Adv Intell Syst Comput 871:328\u2013349","journal-title":"Adv Intell Syst Comput"},{"key":"28_CR39","doi-asserted-by":"crossref","unstructured":"Rusyn B, Vysotska V, Pohreliuk L (2018) Model and architecture for virtual library information system. In: International scientific and technical conference on computer sciences and information technologies, CSIT 2018 \u2013 Proceedings, vol 1, pp 37\u201341","DOI":"10.1109\/STC-CSIT.2018.8526679"}],"container-title":["Advances in Intelligent Systems and Computing","Lecture Notes in Computational Intelligence and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26474-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T13:08:25Z","timestamp":1695042505000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-26474-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,24]]},"ISBN":["9783030264734","9783030264741"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26474-1_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,7,24]]},"assertion":[{"value":"24 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDMCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Scientific Conference \u201cIntellectual Systems of Decision Making and Problem of Computational Intelligence\u201d","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zalizniy Port","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isdmci2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isdmci.org.ua\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}