| Peer-Reviewed

Wireless Network Security Threats, Vulnerabilities and Their Defences

Received: 30 October 2016     Accepted: 22 November 2016     Published: 3 January 2017
Views:       Downloads:
Abstract

Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) and WPA (Wireless Fidelity Protected Access) have been proposed in this paper. Both of these conventions are by large used to scramble the present information and data preventing unapproved clients and Wireless Fidelity (Wi-Fi) programmers from decoding the information and hacking the Wi-Fi systems. Anybody within the range of the Wireless Fidelity system can connect to it with the help the Access Point (AP). In addition the Universal Mobile Telecommunications System (UMTS) system is contrasted with Wi-Fi Network for better execution in security.

Published in American Journal of Operations Management and Information Systems (Volume 2, Issue 1)
DOI 10.11648/j.ajomis.20170201.11
Page(s) 1-4
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2017. Published by Science Publishing Group

Keywords

Wi-Fi, WEP, WPA, WLAN, AP, UMTS, WSA, ICE

References
[1] Djabri Fahed and Rongke Liu (2013), “WiFi-Based Localization in Dynamic Indoor Environment Using a Dynamic Neural Network”, International Journal of Machine Learning and Computing, Vol. 3, No. 1.
[2] Gints Jekabsons, Vadim Kairish et al. (2011), “An Analysis of Wi-Fi Based Indoor Positioning Accuracy”, Scientific Journal of Riga Technical University Computer Science. Applied Computer Systems, Vol. 47.
[3] Jiangfan Feng, Yanhong Liu (2012), “Wi-Fibased Indoor Navigation with Mobile GIS and Speech Recognition”, IJCSI International Journal of Computer Science Issues, Vol. 9, No. 6, pp. 1694-0814.
[4] Kihun Kim, Younghyun Kim, Sangheon Pack and Nakjung Choi (2011), “An SNR-based Admission Control Scheme in Wi-Fi Based Vehicular Networks”, EURASIP Journal on Wireless Communications and Networking.
[5] Beck, M., Tews, E.: Practical Attacks against WEP and WPA. In: Proc. 2009 Second ACM Conference on Wireless network Security (Wisec) 2009.
[6] Sriram, V. S. S, Sahoo, G., Agawal, K.K.: Detecting and Eliminating Rouge Access Points in IEEE-802.11 WLAN–A MultiAgent Sourcing Agent Methodology. Birla Institute of Technology, India (2010).
[7] P. Feng, Wireless LAN security issues and solutions, IEEE Symposium on the Robotics and Applications (ISRA), 2012.
[8] Panigrahy, S. K, Jena, S. K, Turuk, A. K.: Security in Bluetooth, RFID and Wireless Sensor Network. In: Proc. 2011 ICCCS’11, India (2011).
[9] Andrew A. Vladimirov, Konstantin V. Gavrilenko and Andrei A. Mikhailovsky: Wi-Foo: The Secrets of Wireless Hacking, Pearson / Addison Wesley (2004).
[10] G. A. Mendez, L. C. D. Silva &A. Punchihewa, Review of Present IEEE 802.11 “Wi-Fi” Security Issues and of Other Possible Vulnerabilities, Institute of Information Sciences & Technology, Massey University, New Zealand.
[11] J. S. Park & D. Dicoi, WLAN security: current and future. IEEE Internet Computing, 7(5), 2003, 60-65.
Cite This Article
  • APA Style

    Alex Roney Mathew, Aayad Al Hajj. (2017). Wireless Network Security Threats, Vulnerabilities and Their Defences. American Journal of Operations Management and Information Systems, 2(1), 1-4. https://doi.org/10.11648/j.ajomis.20170201.11

    Copy | Download

    ACS Style

    Alex Roney Mathew; Aayad Al Hajj. Wireless Network Security Threats, Vulnerabilities and Their Defences. Am. J. Oper. Manag. Inf. Syst. 2017, 2(1), 1-4. doi: 10.11648/j.ajomis.20170201.11

    Copy | Download

    AMA Style

    Alex Roney Mathew, Aayad Al Hajj. Wireless Network Security Threats, Vulnerabilities and Their Defences. Am J Oper Manag Inf Syst. 2017;2(1):1-4. doi: 10.11648/j.ajomis.20170201.11

    Copy | Download

  • @article{10.11648/j.ajomis.20170201.11,
      author = {Alex Roney Mathew and Aayad Al Hajj},
      title = {Wireless Network Security Threats, Vulnerabilities and Their Defences},
      journal = {American Journal of Operations Management and Information Systems},
      volume = {2},
      number = {1},
      pages = {1-4},
      doi = {10.11648/j.ajomis.20170201.11},
      url = {https://doi.org/10.11648/j.ajomis.20170201.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajomis.20170201.11},
      abstract = {Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) and WPA (Wireless Fidelity Protected Access) have been proposed in this paper. Both of these conventions are by large used to scramble the present information and data preventing unapproved clients and Wireless Fidelity (Wi-Fi) programmers from decoding the information and hacking the Wi-Fi systems. Anybody within the range of the Wireless Fidelity system can connect to it with the help the Access Point (AP). In addition the Universal Mobile Telecommunications System (UMTS) system is contrasted with Wi-Fi Network for better execution in security.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Wireless Network Security Threats, Vulnerabilities and Their Defences
    AU  - Alex Roney Mathew
    AU  - Aayad Al Hajj
    Y1  - 2017/01/03
    PY  - 2017
    N1  - https://doi.org/10.11648/j.ajomis.20170201.11
    DO  - 10.11648/j.ajomis.20170201.11
    T2  - American Journal of Operations Management and Information Systems
    JF  - American Journal of Operations Management and Information Systems
    JO  - American Journal of Operations Management and Information Systems
    SP  - 1
    EP  - 4
    PB  - Science Publishing Group
    SN  - 2578-8310
    UR  - https://doi.org/10.11648/j.ajomis.20170201.11
    AB  - Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) and WPA (Wireless Fidelity Protected Access) have been proposed in this paper. Both of these conventions are by large used to scramble the present information and data preventing unapproved clients and Wireless Fidelity (Wi-Fi) programmers from decoding the information and hacking the Wi-Fi systems. Anybody within the range of the Wireless Fidelity system can connect to it with the help the Access Point (AP). In addition the Universal Mobile Telecommunications System (UMTS) system is contrasted with Wi-Fi Network for better execution in security.
    VL  - 2
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • IT Department, College of Applied Sciences, Sohar, Sultanate of Oman

  • IT Department, College of Applied Sciences, Sohar, Sultanate of Oman

  • Sections