Survey Paper: State of the Art in Secure Wireless Propagation
Advances in Wireless Communications and Networks
Volume 1, Issue 4, November 2015, Pages: 21-28
Received: Mar. 1, 2016; Accepted: Mar. 24, 2016; Published: Mar. 14, 2016
Views 3434      Downloads 200
Peter S. Nyakomitta, Department Of Computing, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya
Wilson K. Cheruiyot, Department Of Computing, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya
Agnes N. Mindila, Department Of Computing, Jomo Kenyatta University of Agriculture and Technology, Nairobi, Kenya
Article Tools
Follow on us
Wireless networks provide an efficient means of connecting network devices. This is because they are fast, cost effective, flexible and easy to use. However, their usage is hindered by a number of challenges, owing to the fact that the physical connections between devices are replaced by logical associations. This means that anybody with a radio detector can receive these signals. Moreover, the data propagation in wireless environment is broadcast in nature and hence propagations can be overheard by anyone within a given range. To address these challenges, authentication protocols have been developed to deter any illicit access to these networks. They include Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). However, these protocols have been shown to be easily compromised, for example due to the utilization of weak initialization vector which leads to collision of the generated hashes. This necessitates the development of more secure mechanisms for protecting the information in transit. The latest effort in securing wireless data propagations involves the usage of the light-fidelity technology. In this paper, a survey of these security technologies given.
Light-fidelity, wireless networks, data security
To cite this article
Peter S. Nyakomitta, Wilson K. Cheruiyot, Agnes N. Mindila, Survey Paper: State of the Art in Secure Wireless Propagation, Advances in Wireless Communications and Networks. Vol. 1, No. 4, 2015, pp. 21-28. doi: 10.11648/j.awcn.20150104.11
Copyright © 2015 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License ( which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abdul, M. (2010), “WLAN Security”, Technical report, IDE1013.
Zepnep,G., Halim, A and Ali, M. (2013), “Security Mechanisms and Their Performance Impacts On wireless Local Area Networks”.
Karen, S. and Cyrus, T. (2008), “Guide to Security Legacy IEEE 802.11 Wireless Networks”, NIST Special Publication 800-48 Revision 1.
Rico, R. (2012), “Wireless Security Wi-Fi Protected Access 2 (WPA2)”.
Mustafa and Samani. (2010), “WEP and WPA Improvement”, Wireless Sensor Network.
Alexander, G. (2011), “Wired Equivalent Privacy (WEP) Functionality, weak points, Attacks”.
Vanhoef, Mathy and Frank. (2013), “Practical Verification of WPA-TKIP Vulnerabilities”, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security.
Stefan, V. (2011), “Brute forcing Wi-Fi Protected Setup”.
Halvorsen and Finn. (2009), “An Improved Attack on TKIP, 5838. pp. 120–132”.
Vanhoef, Mathy, Piessens and Frank. (2014), “Advanced Wi-Fi Attacks Using Commodity Hardware”, Proceedings of the 30th Annual Computer Security Applications Conference.
Van and Joris. (2010), “WPA key calculation — From passphrase to hexadecimal key”.
Strand, L. (2014), “802.1X Port−Based Authentication”.
Kak, A. (2014), “Computer and Network Security”.
Jason, B. (2011), “Wireless Security”.
Jonsson, J. (2010), “On the Security of CTR + CBC-MAC”.
Rani, J., Prerna, C and Tripathi, R. (2012), “Li-Fi (Light Fidelity)-The future technology In Wireless communication”, International Journal of Applied Engineering Research.
Matthew H. (2013), “Implementation of LiFi Technology”.
Rahaim, M and Vegni, B. (2011), “A hybrid radio frequency and broadcast visible light data Propagation system”, In [IEEE Global Communications Conference (GLOBECOM 2011) Workshops].
Suilivian, D. (2012),”Criteria for network security Evaluation”.
Chia, T.(2012), “Confidentiality, integrity, Availability: The three components of the CIAT Traid”.
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
Tel: (001)347-983-5186