| Peer-Reviewed

Survey Paper: State of the Art in Secure Wireless Propagation

Received: 1 March 2016    Accepted: 24 March 2016    Published: 14 March 2016
Views:       Downloads:
Abstract

Wireless networks provide an efficient means of connecting network devices. This is because they are fast, cost effective, flexible and easy to use. However, their usage is hindered by a number of challenges, owing to the fact that the physical connections between devices are replaced by logical associations. This means that anybody with a radio detector can receive these signals. Moreover, the data propagation in wireless environment is broadcast in nature and hence propagations can be overheard by anyone within a given range. To address these challenges, authentication protocols have been developed to deter any illicit access to these networks. They include Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). However, these protocols have been shown to be easily compromised, for example due to the utilization of weak initialization vector which leads to collision of the generated hashes. This necessitates the development of more secure mechanisms for protecting the information in transit. The latest effort in securing wireless data propagations involves the usage of the light-fidelity technology. In this paper, a survey of these security technologies given.

Published in Advances in Wireless Communications and Networks (Volume 1, Issue 4)
DOI 10.11648/j.awcn.20150104.11
Page(s) 21-28
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Light-fidelity, wireless networks, data security

References
[1] Abdul, M. (2010), “WLAN Security”, Technical report, IDE1013.
[2] Zepnep,G., Halim, A and Ali, M. (2013), “Security Mechanisms and Their Performance Impacts On wireless Local Area Networks”.
[3] Karen, S. and Cyrus, T. (2008), “Guide to Security Legacy IEEE 802.11 Wireless Networks”, NIST Special Publication 800-48 Revision 1.
[4] Rico, R. (2012), “Wireless Security Wi-Fi Protected Access 2 (WPA2)”.
[5] Mustafa and Samani. (2010), “WEP and WPA Improvement”, Wireless Sensor Network.
[6] Alexander, G. (2011), “Wired Equivalent Privacy (WEP) Functionality, weak points, Attacks”.
[7] Vanhoef, Mathy and Frank. (2013), “Practical Verification of WPA-TKIP Vulnerabilities”, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security.
[8] Stefan, V. (2011), “Brute forcing Wi-Fi Protected Setup”.
[9] Halvorsen and Finn. (2009), “An Improved Attack on TKIP, 5838. pp. 120–132”.
[10] Vanhoef, Mathy, Piessens and Frank. (2014), “Advanced Wi-Fi Attacks Using Commodity Hardware”, Proceedings of the 30th Annual Computer Security Applications Conference.
[11] Van and Joris. (2010), “WPA key calculation — From passphrase to hexadecimal key”.
[12] Strand, L. (2014), “802.1X Port−Based Authentication”.
[13] Kak, A. (2014), “Computer and Network Security”.
[14] Jason, B. (2011), “Wireless Security”.
[15] Jonsson, J. (2010), “On the Security of CTR + CBC-MAC”.
[16] Rani, J., Prerna, C and Tripathi, R. (2012), “Li-Fi (Light Fidelity)-The future technology In Wireless communication”, International Journal of Applied Engineering Research.
[17] Matthew H. (2013), “Implementation of LiFi Technology”.
[18] Rahaim, M and Vegni, B. (2011), “A hybrid radio frequency and broadcast visible light data Propagation system”, In [IEEE Global Communications Conference (GLOBECOM 2011) Workshops].
[19] Suilivian, D. (2012),”Criteria for network security Evaluation”.
[20] Chia, T.(2012), “Confidentiality, integrity, Availability: The three components of the CIAT Traid”.
Cite This Article
  • APA Style

    Peter S. Nyakomitta, Wilson K. Cheruiyot, Agnes N. Mindila. (2016). Survey Paper: State of the Art in Secure Wireless Propagation. Advances in Wireless Communications and Networks, 1(4), 21-28. https://doi.org/10.11648/j.awcn.20150104.11

    Copy | Download

    ACS Style

    Peter S. Nyakomitta; Wilson K. Cheruiyot; Agnes N. Mindila. Survey Paper: State of the Art in Secure Wireless Propagation. Adv. Wirel. Commun. Netw. 2016, 1(4), 21-28. doi: 10.11648/j.awcn.20150104.11

    Copy | Download

    AMA Style

    Peter S. Nyakomitta, Wilson K. Cheruiyot, Agnes N. Mindila. Survey Paper: State of the Art in Secure Wireless Propagation. Adv Wirel Commun Netw. 2016;1(4):21-28. doi: 10.11648/j.awcn.20150104.11

    Copy | Download

  • @article{10.11648/j.awcn.20150104.11,
      author = {Peter S. Nyakomitta and Wilson K. Cheruiyot and Agnes N. Mindila},
      title = {Survey Paper: State of the Art in Secure Wireless Propagation},
      journal = {Advances in Wireless Communications and Networks},
      volume = {1},
      number = {4},
      pages = {21-28},
      doi = {10.11648/j.awcn.20150104.11},
      url = {https://doi.org/10.11648/j.awcn.20150104.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20150104.11},
      abstract = {Wireless networks provide an efficient means of connecting network devices. This is because they are fast, cost effective, flexible and easy to use. However, their usage is hindered by a number of challenges, owing to the fact that the physical connections between devices are replaced by logical associations. This means that anybody with a radio detector can receive these signals. Moreover, the data propagation in wireless environment is broadcast in nature and hence propagations can be overheard by anyone within a given range. To address these challenges, authentication protocols have been developed to deter any illicit access to these networks. They include Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). However, these protocols have been shown to be easily compromised, for example due to the utilization of weak initialization vector which leads to collision of the generated hashes. This necessitates the development of more secure mechanisms for protecting the information in transit. The latest effort in securing wireless data propagations involves the usage of the light-fidelity technology. In this paper, a survey of these security technologies given.},
     year = {2016}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Survey Paper: State of the Art in Secure Wireless Propagation
    AU  - Peter S. Nyakomitta
    AU  - Wilson K. Cheruiyot
    AU  - Agnes N. Mindila
    Y1  - 2016/03/14
    PY  - 2016
    N1  - https://doi.org/10.11648/j.awcn.20150104.11
    DO  - 10.11648/j.awcn.20150104.11
    T2  - Advances in Wireless Communications and Networks
    JF  - Advances in Wireless Communications and Networks
    JO  - Advances in Wireless Communications and Networks
    SP  - 21
    EP  - 28
    PB  - Science Publishing Group
    SN  - 2575-596X
    UR  - https://doi.org/10.11648/j.awcn.20150104.11
    AB  - Wireless networks provide an efficient means of connecting network devices. This is because they are fast, cost effective, flexible and easy to use. However, their usage is hindered by a number of challenges, owing to the fact that the physical connections between devices are replaced by logical associations. This means that anybody with a radio detector can receive these signals. Moreover, the data propagation in wireless environment is broadcast in nature and hence propagations can be overheard by anyone within a given range. To address these challenges, authentication protocols have been developed to deter any illicit access to these networks. They include Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). However, these protocols have been shown to be easily compromised, for example due to the utilization of weak initialization vector which leads to collision of the generated hashes. This necessitates the development of more secure mechanisms for protecting the information in transit. The latest effort in securing wireless data propagations involves the usage of the light-fidelity technology. In this paper, a survey of these security technologies given.
    VL  - 1
    IS  - 4
    ER  - 

    Copy | Download

Author Information
  • Department Of Computing, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya

  • Department Of Computing, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya

  • Department Of Computing, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya

  • Sections