Anticipating WPS PIN Vulnerability to Secure Wireless Network

Indra Dwi Rianto


WiFi Protected Setup (WPS) is a standardized function supported by numerous vendors of wireless routers and access point to help set up connection to a wireless local area network. It is designed to simplify the set up and generally enabled by default. Due to design flaw, the WPS or QSS PIN is susceptible to a brute force
attack. In this paper, we test the security vulnerability occurred, evaluate the performance and give recommendations to anticipate the attack.


wireless network, wifi protected setup, quick security setup

Full Text:



Broadcom. (2012-02-28). SecureEasySetup Software. Retrieved February 28, 2013 from Broadcom website:

Heffner, Craig (2011). Cracking WiFi Protected Setup with Reaver. Retrieved February 28, 2013 from Tactical Network Solutions website:

Higgins, Tim. (2008). How is WPS supposed to work? Retrieved February 28, 2013 from SmallNetBuilder website:


Pash, Adams. (2012). How to Crack a Wi-Fi Network’s WPA Password with Reaver. Retrieved February 28, 2013 from Lifehacker website:


Viehböck, Stefan. (2011). Brute forcing Wi-Fi Protected Setup. Retrieved February 28, 2013 from

Wi-Fi Alliance. (2007). Wi-Fi CERTIFIED™ for Wi-Fi Protected Setup: Easing the User Experience for Home and Small Office Wi-Fi® Networks. Retrieved February 28, 2013 from Wi-Fi Alliance website:



  • There are currently no refbacks.

Public Visitor Statistics:ComTech stats
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.