ABSTRACT
In nowadays, many users use wireless networks, which are usually based on the IEEE 802.11 standard (Wi-Fi). Because of broadcast technology used, they are easily susceptible to security attacks. It is very important to study the risks and potential vulnerabilities of Wi-Fi networks to recommend users how to improve their security. This paper presents a research of the security of wireless networks in city of Varna, Bulgaria, and methodology based on war-driving technique. The obtained results are summarized and compared with those from previous research. The recommendations for users are formulated.
- G. Colbach (2017). Wireless Networking: Introduction to Bluetooth and WiFi. Independently published.Google Scholar
- IEEE 802.11 Wireles local area networks, http://www.ieee802.org/11/.Google Scholar
- S. Gopalakrishnan (2014). A survey of wireless network security. IJCSMC, 1(3), 53--68.Google Scholar
- IEEE 802.11-2016 - IEEE Standard for Information technology. https://standards.ieee.org/standard/802_11-2016.html.Google Scholar
- NetSpot Wireless security protocols: WEP, WPA, WPA2, and WPA3, https://www.netspotapp.com/wifi-encryption-and-security.html.Google Scholar
- S.Viehböck, Brute forcing Wi-Fi Protected Setup, https://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.Google Scholar
- P.Shipley, 802.11b War Driving and Lan Jacking, https://www.defcon.org/html/defcon-9/defcon-9-speakers.html.Google Scholar
- D.Dobrilovic (2016). A method for comparing and analyzing wireless security situations in two capital cities. Acta Polytechnica Hungarica, 3(13), 67--86.Google Scholar
- S.S.Sebbar (2016). An empirical study of WIFI security and performance in Morocco - wardriving in Rabat.Google Scholar
- K.A.Kyaw, Z.Tian and B.Cisak (2016). Wi-Pi: a study of WLAN security in Auckland city. IJCSNS, 8(16), 68--80.Google Scholar
- S.U.Priya (2013). The Impact of War Driving On Wireless Networks. IJCSET, 3(6), 230--235.Google Scholar
- H.Singh and J.Singh (2017). Penetration testing in Wireless Networks. IJARCS, 2213--2216. ISSN 0976-5697.Google Scholar
- H.Valchanov, I.Ruskov and A.Varbanov (2009). A Study of the Wireless Network Security. Proc of "Computer Science 2009", 273--278.Google Scholar
Index Terms
- An Empirical Study of Wireless Security in City Environment
Recommendations
Wireless security techniques: an overview
InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum developmentThis paper provides a survey of the different techniques that can be used to strengthen security in wireless local area networks (WLANs). The first generation of WLANs were deployed by small businesses and individuals at homes. The second generation of ...
Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols
e-Forensics '08: Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshopWireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are, however, faced with some serious security challenges and the choice of security protocol is a critical issue for IT ...
Wireless Security Auditing
Wireless security is concise on protecting the resources connected to the wireless network from unauthorized access. Wi-Fi Protected Access II (WPA2) is a predominant variety of cryptography based wireless security protocol, which is crafted to be ...
Comments