Security threats analysis of wireless local area network

Authors

  • Agbeboaye C Department of Electrical and Electronic Engineering Technology, National Institute of Construction Technology (NICT), Uromi, Nigeria
  • Akpojedje FO Department of Electrical and Electronic Engineering Technology, National Institute of Construction Technology (NICT), Uromi, Nigeria
  • Okoekhian J Department of Electrical and Electronic Engineering Technology, National Institute of Construction Technology (NICT), Uromi, Nigeria

Keywords:

Network Security, Security Protocols, Wireless Network, WPA2, Wi-Fi, Network Attacks

Abstract

There is a geometric growth in the manufacturing and sales of wireless network devices presently. This growth is not connected with the advantages ushered in by wireless network e.g user mobility, the flexibility of the network, enable network connection for different kinds of devices, increased productivity, etc. However, because the wireless network is broadcast in nature, it has numerous security challenges, if these security challenges are not addressed, different attacks can be lunged against the network such as theft of data, unauthorized access to the network, denial of service, etc. These security challenges are caused majorly by the body implementing the data confidentiality protocol and the wireless device users. Nowadays, almost all wireless access points (APs) are secured with Wi-Fi Protected Access 2 (WPA2) because hitherto WPA2 is known to provide the highest form of security to wireless local area network (WLAN). Consequently, we investigated various wireless network security protocols, focusing more on WPA2 since it is the latest amongst the protocols. Real-time dictionary attack against WPA2 was carried out to prove the existence of flaws in the protocol. Hence, countermeasures were proposed to forestall these flaws in the system and; if the suggested measures are implemented, it will lead to the development of a more secure wireless network.

References

Choi, MK, Robles,R., Hong, CH and Kim, TH “Wireless Network Security: Vulnerabilities, Threats and Countermeasure”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 3, No. 3, (2008), Pg.. 77 – 86.

Abiona, O., Oluwaranti, A., Oluwatope, A., Bello, S., Onime, C., Sanni, M and Kehinde, L. “Wireless Network Security: The Mobile Agent Approach”, International Journal of Communications, Network and System Sciences, 6, (2013), Pg. 443 – 450

Prodanovic, R and Simic, D. “A Survey of Wireless Security”, Journal of Computing and Information Technology – CIT, Vol 15, No 3, (2007), pp. 237 – 255

Orukpe, P.E., Erhiaguna, T.O and Agbontaen, F.O. “Computer Security and Privacy in Wireless Local Area Network in Nigeria”, International Journal of Engineering Research in Africa, Vol 9, (2013), Pg. 23 – 33

Wikipedia, “Wired Equivalent Privacy,”https://en.m.wikipedia.org/wiki/wired_Equivalent_Privacy#Security-details

Guillaume Lehembre, “Wi-Fi security –WEP, WPA and WPA2”, www.hakin9.org

Bilger, J., Cosand, H., Noor-E-Gagan Singh, NEG and Xaview, J. “Security and Legal Implications of Wireless Networks, Protocols and Devices

Sithirasenan, E., Zafar, S and Muthukkumarasamy, V. “Formal Verification of the IEEE 802.11i WLAN Security Protocol”, In Australian Software Engineering Conference (ASWEC 06), Pg. 181 – 190

Vanhoef, M and Piessens, F. “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2”, 2017.

Eum, SH., Kim, YH and Choi, HK. “A Secure 4-Way Handshake in 802.11i Using Cookies”, International Journal of Principles and Applications of Information Science and Technology, Vol 2, No 1, (2008).

Downloads

Published

2024-02-26

How to Cite

Agbeboaye, C., Akpojedje, F. O., & Okoekhian, J. (2024). Security threats analysis of wireless local area network. COMPUSOFT: An International Journal of Advanced Computer Technology, 7(06), 2773–2779. Retrieved from https://ijact.in/index.php/j/article/view/436

Issue

Section

Original Research Article

Similar Articles

<< < 5 6 7 8 9 10 11 12 13 14 > >> 

You may also start an advanced similarity search for this article.