@ijiris

A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY

. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 20-28 (January 2019)1. Khidir, M. and Ali, A. (2011).A Comparative Study of Authentication Methods for Wi-Fi Networks. In: Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks Online, pp. 190-194. 2. Sheila, F., Bernard, E., Les, O., Karen, S.(2007). Establishing Wireless Robust security Networks: A Guide to IEEE 802.11i, NIST.US. 3. Kwang-Hyun, B., Sean, W. and David, K. (2004). A Survey of WPA and 802.11i RSN Authentication Protocols. Dartmouth College: Computer Science Technial Report TR2004-524. Available at: www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf 4. Borisov,N. , Goldberg,I. and Wagner, D.(2001). Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy: ACM Press. 5. Yizhan, S. (2006). Complexity of System Configuration Management, PhD thesis, Tufts University..
DOI: doi://10.26562/IJIRIS.2019.JAIS10082

Abstract

This paper presents various security features and configurations commonly implemented in WLANs and their aggregated security levels and then proposes a model that enables implementation and evaluation of WLAN security.

Description

In recent years, the proliferation of wireless local area network[WLAN] enabled laptop computers, smart phones and tablets has caused an increase in the range of places people perform computing. As a result, WLANs of various kinds have gained a lot of popularity. But with the added convenience of wireless access come new problems: Security. When transmissions are broadcast over radio waves, interception and masquerading becomes trivial to anyone with WLAN enabled device in the range. WLANs implement IEEE 802.11i and IEEE 802.11w standards whose focus is provision of appropriate integrity and confidentiality levels. These standards provide a variety of options for various security features.This flexible nature of the provisions of these standards and supporting technologies create potential for selection of vulnerable cipher suite, authentication & access control, end-user and server system security features. This makes selection and configuration of the appropriate security features a challenge to many WLAN security implementers [1]. This issue is a major concern because several software attack tools targeting vulnerabilities in authentication methods, cipher suites and supporting technologies on client devices and server implementations continue to proliferate, effectively empowering attackers. This research aims to make a contribution by addressing the issue of poor implementation of WLAN security through development of a model that enables design or selection of security features and their configuration for WLAN security.

Links and resources

Tags