Security Evaluation of Wireless Network Access Points

The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it h...

Full description

Bibliographic Details
Main Authors: Kalniņš Rūdolfs, Puriņš Jānis, Alksnis Gundars
Format: Article
Language:English
Published: Sciendo 2017-05-01
Series:Applied Computer Systems
Subjects:
Online Access:https://doi.org/10.1515/acss-2017-0005
_version_ 1819131831428055040
author Kalniņš Rūdolfs
Puriņš Jānis
Alksnis Gundars
author_facet Kalniņš Rūdolfs
Puriņš Jānis
Alksnis Gundars
author_sort Kalniņš Rūdolfs
collection DOAJ
description The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.
first_indexed 2024-12-22T09:21:45Z
format Article
id doaj.art-a8bbce900acb47b59f41e5b36f530eb5
institution Directory Open Access Journal
issn 2255-8691
language English
last_indexed 2024-12-22T09:21:45Z
publishDate 2017-05-01
publisher Sciendo
record_format Article
series Applied Computer Systems
spelling doaj.art-a8bbce900acb47b59f41e5b36f530eb52022-12-21T18:31:10ZengSciendoApplied Computer Systems2255-86912017-05-01211384510.1515/acss-2017-0005acss-2017-0005Security Evaluation of Wireless Network Access PointsKalniņš Rūdolfs0Puriņš Jānis1Alksnis Gundars2Riga State German Grammar School, Riga, LatviaRiga State German Grammar School, Riga, LatviaDepartment of Applied Computer Science, Riga Technical University, Riga, LatviaThe paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.https://doi.org/10.1515/acss-2017-0005network securityunauthorised accesswireless networks
spellingShingle Kalniņš Rūdolfs
Puriņš Jānis
Alksnis Gundars
Security Evaluation of Wireless Network Access Points
Applied Computer Systems
network security
unauthorised access
wireless networks
title Security Evaluation of Wireless Network Access Points
title_full Security Evaluation of Wireless Network Access Points
title_fullStr Security Evaluation of Wireless Network Access Points
title_full_unstemmed Security Evaluation of Wireless Network Access Points
title_short Security Evaluation of Wireless Network Access Points
title_sort security evaluation of wireless network access points
topic network security
unauthorised access
wireless networks
url https://doi.org/10.1515/acss-2017-0005
work_keys_str_mv AT kalninsrudolfs securityevaluationofwirelessnetworkaccesspoints
AT purinsjanis securityevaluationofwirelessnetworkaccesspoints
AT alksnisgundars securityevaluationofwirelessnetworkaccesspoints