Wireless Network Security Threats, Vulnerabilities and Their Defences
American Journal of Operations Management and Information Systems
Volume 2, Issue 1, February 2017, Pages: 1-4
Received: Oct. 30, 2016;
Accepted: Nov. 22, 2016;
Published: Jan. 3, 2017
Views 5163 Downloads 164
Alex Roney Mathew, IT Department, College of Applied Sciences, Sohar, Sultanate of Oman
Aayad Al Hajj, IT Department, College of Applied Sciences, Sohar, Sultanate of Oman
Follow on us
Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) and WPA (Wireless Fidelity Protected Access) have been proposed in this paper. Both of these conventions are by large used to scramble the present information and data preventing unapproved clients and Wireless Fidelity (Wi-Fi) programmers from decoding the information and hacking the Wi-Fi systems. Anybody within the range of the Wireless Fidelity system can connect to it with the help the Access Point (AP). In addition the Universal Mobile Telecommunications System (UMTS) system is contrasted with Wi-Fi Network for better execution in security.
Wi-Fi, WEP, WPA, WLAN, AP, UMTS, WSA, ICE
To cite this article
Alex Roney Mathew,
Aayad Al Hajj,
Wireless Network Security Threats, Vulnerabilities and Their Defences, American Journal of Operations Management and Information Systems.
Vol. 2, No. 1,
2017, pp. 1-4.
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/
) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Djabri Fahed and Rongke Liu (2013), “WiFi-Based Localization in Dynamic Indoor Environment Using a Dynamic Neural Network”, International Journal of Machine Learning and Computing, Vol. 3, No. 1.
Gints Jekabsons, Vadim Kairish et al. (2011), “An Analysis of Wi-Fi Based Indoor Positioning Accuracy”, Scientific Journal of Riga Technical University Computer Science. Applied Computer Systems, Vol. 47.
Jiangfan Feng, Yanhong Liu (2012), “Wi-Fibased Indoor Navigation with Mobile GIS and Speech Recognition”, IJCSI International Journal of Computer Science Issues, Vol. 9, No. 6, pp. 1694-0814.
Kihun Kim, Younghyun Kim, Sangheon Pack and Nakjung Choi (2011), “An SNR-based Admission Control Scheme in Wi-Fi Based Vehicular Networks”, EURASIP Journal on Wireless Communications and Networking.
Beck, M., Tews, E.: Practical Attacks against WEP and WPA. In: Proc. 2009 Second ACM Conference on Wireless network Security (Wisec) 2009.
Sriram, V. S. S, Sahoo, G., Agawal, K.K.: Detecting and Eliminating Rouge Access Points in IEEE-802.11 WLAN–A MultiAgent Sourcing Agent Methodology. Birla Institute of Technology, India (2010).
P. Feng, Wireless LAN security issues and solutions, IEEE Symposium on the Robotics and Applications (ISRA), 2012.
Panigrahy, S. K, Jena, S. K, Turuk, A. K.: Security in Bluetooth, RFID and Wireless Sensor Network. In: Proc. 2011 ICCCS’11, India (2011).
Andrew A. Vladimirov, Konstantin V. Gavrilenko and Andrei A. Mikhailovsky: Wi-Foo: The Secrets of Wireless Hacking, Pearson / Addison Wesley (2004).
G. A. Mendez, L. C. D. Silva &A. Punchihewa, Review of Present IEEE 802.11 “Wi-Fi” Security Issues and of Other Possible Vulnerabilities, Institute of Information Sciences & Technology, Massey University, New Zealand.
J. S. Park & D. Dicoi, WLAN security: current and future. IEEE Internet Computing, 7(5), 2003, 60-65.