Portada: Infraestructura para la Logística Sustentable 2050
DESTACADO | CPI Propone - Resumen Ejecutivo

Infraestructura para el desarrollo que queremos 2026-2030

Elaborado por el Consejo de Políticas de Infraestructura (CPI), este documento constituye una hoja de ruta estratégica para orientar la inversión y la gestión de infraestructura en Chile. Presenta propuestas organizadas en siete ejes estratégicos, sin centrarse en proyectos específicos, sino en influir en las decisiones de política pública para promover una infraestructura que conecte territorios, genere oportunidades y eleve la calidad de vida de la población.
ARTÍCULO
TITULO

SECURITY THREATS ANALYSIS OF WIRELESS LOCAL AREA NETWORK

Clement Agbeboaye    
France O. Akpojedje    
Joshua Okoekhian    

Resumen

There is a geometric growth in the manufacturing and sales of wireless network devices presently. This growth is not connected with the advantages ushered in by wireless network e.g user mobility, the flexibility of the network, enable network connection for different kinds of devices, increased productivity, etc. However, because the wireless network is broadcast in nature, it has numerous security challenges, if these security challenges are not addressed, different attacks can be lunged against the network such as theft of data, unauthorized access to the network, denial of service, etc. These security challenges are caused majorly by the body implementing the data confidentiality protocol and the wireless device users. Nowadays, almost all wireless access points (APs) are secured with Wi-Fi Protected Access 2 (WPA2) because hitherto WPA2 is known to provide the highest form of security to wireless local area network (WLAN). Consequently, we investigated various wireless network security protocols, focusing more on WPA2 since it is the latest amongst the protocols. Real-time dictionary attack against WPA2 was carried out to prove the existence of flaws in the protocol. Hence, countermeasures were proposed to forestall these flaws in the system and; if the suggested measures are implemented, it will lead to the development of a more secure wireless network.

Artículos similares

Hemos preparados una selección de otros artículos que pudieran ser de tu interés
Poornima Mahadevappa, Redhwan Al-amri, Gamal Alkawsi, Ammar Ahmed Alkahtani, Mohammed Fahad Alghenaim and Mohammed Alsamman    
Edge data analytics refers to processing near data sources at the edge of the network to reduce delays in data transmission and, consequently, enable real-time interactions. However, data analytics at the edge introduces numerous security risks that can ... ver más
Revista: IoT
Abdullah Baz, Riaz Ahmed, Suhel Ahmad Khan and Sudesh Kumar    
The relevance of Industry 5.0 confirms the collaborative relationship between humans and machines through an inclusive automation process. The healthcare industry at present is facilitated by the use of these emerging technologies, which promise a more p... ver más
Revista: Sustainability
Charles Wheelus and Xingquan Zhu    
The recent surge in Internet of Things (IoT) deployment has increased the pace of integration and extended the reach of the Internet from computers, tablets and phones to a myriad of devices in our physical world. Driven by the IoT, with each passing day... ver más
Revista: IoT
S M Sohel Rana, Miah Abdul Halim and M. Humayun Kabir    
Internet of Things (IoT) opens new horizons by enabling automated procedures without human interaction using IP connectivity. IoT deals with devices, called things, represented as any items from our daily life that are enhanced with computing or communic... ver más
Revista: Applied Sciences
Shaibu Adekunle Shonola,Mike S Joy     Pág. pp. 64 - 70
Innovation in learning technologies and services is driven by demands from Higher Educational Institutions (HEIs) in order to meet their students? needs and make knowledge delivery easier. The technology could play a pivotal role in extending the possibi... ver más