Security Evaluation of Wireless Network Access Points
The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it h...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2017-05-01
|
Series: | Applied Computer Systems |
Subjects: | |
Online Access: | https://doi.org/10.1515/acss-2017-0005 |
_version_ | 1819131831428055040 |
---|---|
author | Kalniņš Rūdolfs Puriņš Jānis Alksnis Gundars |
author_facet | Kalniņš Rūdolfs Puriņš Jānis Alksnis Gundars |
author_sort | Kalniņš Rūdolfs |
collection | DOAJ |
description | The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks. |
first_indexed | 2024-12-22T09:21:45Z |
format | Article |
id | doaj.art-a8bbce900acb47b59f41e5b36f530eb5 |
institution | Directory Open Access Journal |
issn | 2255-8691 |
language | English |
last_indexed | 2024-12-22T09:21:45Z |
publishDate | 2017-05-01 |
publisher | Sciendo |
record_format | Article |
series | Applied Computer Systems |
spelling | doaj.art-a8bbce900acb47b59f41e5b36f530eb52022-12-21T18:31:10ZengSciendoApplied Computer Systems2255-86912017-05-01211384510.1515/acss-2017-0005acss-2017-0005Security Evaluation of Wireless Network Access PointsKalniņš Rūdolfs0Puriņš Jānis1Alksnis Gundars2Riga State German Grammar School, Riga, LatviaRiga State German Grammar School, Riga, LatviaDepartment of Applied Computer Science, Riga Technical University, Riga, LatviaThe paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.https://doi.org/10.1515/acss-2017-0005network securityunauthorised accesswireless networks |
spellingShingle | Kalniņš Rūdolfs Puriņš Jānis Alksnis Gundars Security Evaluation of Wireless Network Access Points Applied Computer Systems network security unauthorised access wireless networks |
title | Security Evaluation of Wireless Network Access Points |
title_full | Security Evaluation of Wireless Network Access Points |
title_fullStr | Security Evaluation of Wireless Network Access Points |
title_full_unstemmed | Security Evaluation of Wireless Network Access Points |
title_short | Security Evaluation of Wireless Network Access Points |
title_sort | security evaluation of wireless network access points |
topic | network security unauthorised access wireless networks |
url | https://doi.org/10.1515/acss-2017-0005 |
work_keys_str_mv | AT kalninsrudolfs securityevaluationofwirelessnetworkaccesspoints AT purinsjanis securityevaluationofwirelessnetworkaccesspoints AT alksnisgundars securityevaluationofwirelessnetworkaccesspoints |