ARTÍCULO
TITULO

SECURITY THREATS ANALYSIS OF WIRELESS LOCAL AREA NETWORK

Clement Agbeboaye    
France O. Akpojedje    
Joshua Okoekhian    

Resumen

There is a geometric growth in the manufacturing and sales of wireless network devices presently. This growth is not connected with the advantages ushered in by wireless network e.g user mobility, the flexibility of the network, enable network connection for different kinds of devices, increased productivity, etc. However, because the wireless network is broadcast in nature, it has numerous security challenges, if these security challenges are not addressed, different attacks can be lunged against the network such as theft of data, unauthorized access to the network, denial of service, etc. These security challenges are caused majorly by the body implementing the data confidentiality protocol and the wireless device users. Nowadays, almost all wireless access points (APs) are secured with Wi-Fi Protected Access 2 (WPA2) because hitherto WPA2 is known to provide the highest form of security to wireless local area network (WLAN). Consequently, we investigated various wireless network security protocols, focusing more on WPA2 since it is the latest amongst the protocols. Real-time dictionary attack against WPA2 was carried out to prove the existence of flaws in the protocol. Hence, countermeasures were proposed to forestall these flaws in the system and; if the suggested measures are implemented, it will lead to the development of a more secure wireless network.

 Artículos similares

       
 
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari    
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac... ver más
Revista: Information

 
Agnieszka Dutkowska-Zuk, Joe Bourne, Chengyuan An, Xuan Gao, Oktay Cetinkaya, Peter Novitzky, Gideon Ogunniye, Rachel Cooper, David De Roure, Julie McCann, Jeremy Watson, Tim Watson and Eleri Jones    
This systematic literature review explores the scholarly debate around public perceptions and behaviors in the context of cybersecurity in connected places. It reveals that, while many articles highlight the importance of public perceptions and behaviors... ver más
Revista: Information

 
Hao An, Ruotong Ma, Yuhan Yan, Tailai Chen, Yuchen Zhao, Pan Li, Jifeng Li, Xinyue Wang, Dongchen Fan and Chunli Lv    
This paper aims to address the increasingly severe security threats in financial systems by proposing a novel financial attack detection model, Finsformer. This model integrates the advanced Transformer architecture with the innovative cluster-attention ... ver más
Revista: Applied Sciences

 
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu    
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How... ver más
Revista: Applied Sciences

 
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara and Ahmad K. Al Hwaitat    
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who ... ver más
Revista: Information