Overview of WLAN security Vulnerabilities

Show simple item record

dc.contributor.author Mhadjou, Abdoulhamid
dc.date.accessioned 2024-01-19T04:47:04Z
dc.date.available 2024-01-19T04:47:04Z
dc.date.issued 2023-05-30
dc.identifier.citation [1] Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D. A survey on security threats and countermeasures in internet of medical things (IoMT). Transactions on Emerging Telecommunications Technologies. 2022 Jun;33(6):e4049. [2] Gunduz, Muhammed Zekeriya, and Resul Das."Cyber-security on smart grid: Threats and potential solutions." Computer networks 169 (2020): 107094. [3] A. Alrawais, A. Alhothaily, . Hu, and X. heng, “Fog omputing for the nternet of Things: Security and rivacy ssues,” EEE nternet omput., vol. 21, no. 2, pp. 3 –42, Mar. 2017. [ ] J. Ni, . Zhang, X. Lin, and X. S. Shen, “Securing Fog omputing for nternet of Things Applications: hallenges and Solutions,” EEE ommun. Surv. Tutorials, vol. 20, no. 1, pp. 601–628, 2018 [5] Mohammed, K.K., WLAN Vulnerability Scanning Methodologies. [6] Zaidan, Doaa Talib. "Analyzing Attacking methods on Wi-Fi wireless networks pertaining (WEP, WPA WPA2) security protocols." Periodicals of Engineering and Natural Sciences (PEN) 9.4 (2021): 1093- 1101. [7] Park, Joon S., and Derrick Dicoi."Syracuse University. WLAN Security: Current and Future‖." IEEE Computer Society (2003). [8] Auslander, David M., and Jean-Dominique Decotignie."Network Fundamentals." Handbook of networked and embedded control systems. Birkhäuser Boston, 2005. 197-223. [9] Hassinen, Timo."Overview of WLAN security." Seminar on Network Security. Vol. 11. No. 12. 2006. [10] Suroto, Suroto."WLAN security: threats and countermeasures." JOIV: International Journal on Informatics Visualization 2.4 (2018): 232-238. [11] https://www.researchgate.net/figure/Analysis-of-Table-3-security-capabilities_fig4_322109575 [12] [13] Suroto, S., 2018. WLAN Security: Threats and Countermeasures. JOIV: International Journal on Informatics Visualization, 2(4), pp.232-238. [14] Aneja, A. and Sodhi, G., 2016. A Study of Security Issues Related with Wireless Fidelity (WI-FI). International Journal of Computer Science Trends and Technology (IJCST), 4(2), en_US
dc.identifier.uri http://hdl.handle.net/123456789/2067
dc.description Supervised by Ms. Lutfun Nahar Lota, Assistant Professor, Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur-1704, Bangladesh en_US
dc.description.abstract The development of wireless network systems has made it easier to communicate using electromagnetic waves, which has led to the removal of the main obstacles to portable communication. In the modern day, where every device—from personal computers to business equipment—uses a variety of coding techniques to share data on the network, wireless networks play a crucial role. However, because wireless networks use the air as a communication medium, they must deal with extra security risks. In this study we outline the security options for WLANs. These security mechanisms are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (WPA2). Our aim is to discover weaknesses in the WLAN security protocol through an attack that can be performed in the system. a description of their operation, structure, and algorithmic framework. and successfully launched attacks against WEP and WPA2 networks in an effort to discover real time vulnerabilities. Three laptops with wi-fi capabilities were used to carry out the attacks in an ad-hoc network [12]. We start with the WEP protocol, which makes use of the weak and readily decipherable RC4 algorithm. Next, we list a few of its shortcomings. Then, as an enhanced version of WEP with some weaknesses, we have WPA. WPA2 vulnerabilities explain, at last. An overview of some tools (software) an attacker uses to break security protocols such as Aircrack-ng en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur-1704, Bangladesh en_US
dc.title Overview of WLAN security Vulnerabilities en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUT Repository


Advanced Search

Browse

My Account

Statistics