“…The process of WLAN authentication mainly include WEP, WPA/connected wpa2-psk, WPS three [1][2][3].However, the weakness of this encryption algorithm is to collect enough IV when RC4 stream of bytes and the first byte, key can be acquired [4]. WPA / wpa2-psk authentication method is widely used, and relatively safe, however, if the users can collect in the certification of 4-way handshake packet when using methods such as dictionary attacks can crack the PSK during the waiting time [5]. On the basis of WPA / WPA2-PSK, the WPS authentication mode is put forward [6].However, this authentication system can not be obtained or rule to judge the legitimacy of PSK users.…”