Asmaa A. Ghanim

Work place: Department of Electrical Engineering, University of Mosul, Mosul, Iraq

E-mail: asmaa.22enp38@student.uomosul.edu.iq

Website: https://orcid.org/0009-0002-3563-6642

Research Interests:

Biography

Asmaa Akram Ghanim completed the B.S. in electrical engineering/ electronic and communication from the University of Mosul, Iraq, in 2020 and received the M.Sc. degree in electronic and communication in 2025. She is interested in the field of computer networks and communication and cybersecurity.

Author Articles
Evaluating the Effectiveness of WPA3 Protocol against Advanced Hacking Attacks

By Asmaa A. Ghanim Mohammed Y. Thanoun

DOI: https://doi.org/10.5815/ijwmt.2025.04.01, Pub. Date: 8 Aug. 2025

Personal Mode Home Wi-Fi networks are an integral part of our daily lives, providing convenience and ease of access to the Internet. However, many people believe that modern encryption protocols such as Wi-Fi Protected Access3 (WPA3) provide sufficiently strong protection. This research aims to evaluate the effectiveness of encryption protocols used in home Wi-Fi networks, focusing on the currently most widely used Wi-Fi Protected Access2 (WPA2) protocol and the newer and more secure WPA3 protocol, and the effectiveness of the Protected Management Frames (PMF) against deauthentication attacks. A penetration test was conducted in a controlled, secure environment using a set of specialized tools such as Aircrack-ng, Fluxion, Bettercap, and Wireshark to assess the vulnerability of these networks to various attacks. The research results showed that home Wi-Fi networks using WPA2 protocol and WPA3 protocol (who support transitional mode) are vulnerable to hacking. deauthentication attacks and dictionary attacks were successful in hacking networks, especially when the passwords were weak or could be guessed. In addition, evil twin attacks using the captive portal approach have been proven effective in penetrating networks that use WPA2 and WPA3 (even when they do not support transitional mode) by exploiting weaknesses in user behavior. The results also show that deauthentication attacks are still effective before establishing a 4-way handshake. This paper proposes some countermeasures to reduce the risk of home network penetration.

[...] Read more.
Other Articles