17,744 research outputs found

    MDS-WLAN: Maximal Data Security in WLAN for Resisting Potential Threats

    Get PDF
    The utmost security standards over Wireless Local Area Network (WLAN) are still an unsolved answer in research community as well as among the commercial users. There are various prior attempts in proposing security of WLAN that lacks focus on access point and is found to be quite complex implementation of cryptography. The proposed paper presents a novel, simple, and yet robust technique called as MDS-WLAN i.e. maximal data security in WLAN. The system is evaluated over laboratory prototype and mitigation measures are drawn for resisting wormhole attack, Sybil attack, and rogue access point issue in WLAN. The outcome of the MDS is compared with conventional AES and SHA that shows optimal communication performance and highest data security

    Implementing Security in a Client/Server Wireless Local Area Network

    Get PDF
    Computer network evolves with birth of Wireless Local Area Network (WLAN). Tangible benefits such as increase employee satisfaction and productivity drive enterprise WLANs adoption. However, security remains the most significant, but least understood in information technology. In the year 2001, academic researchers reported vulnerability in IEEE 802.11b Wired Equivalent Privacy (WEP) protocol. Solutions from IEEE 802.11 IETF, Wi-Fi Alliance and OEMs are studies for secure wireless solutions. A baseline WLAN which is solely secured by WEP is established. Concerns and security issuess related to WLAN polled by Network Computing in 2002 is used to formulate the interview questions. Interviews with network engineers reviewed security issues and threats during enterprise WLAN deployment. Deploying and maintaining a secure WLAN is governed by three factors. The first factor is technology. Integration of WEP with Virtual Private Networking (VPN) and IPSec, plus 802.1X coupled with EAP and RADIUS server, on existing centralized administration database and security and enable block access at multiple layers of the network. Besides technology, people and process also dictate security in WLAN. Employees should be trained constantly on IT Security Policy and empowered to enforce IT Security, as security is very employee's responsibility. It is a mandate to establish an IS Security Policy to regulate all process and best known methods to constinuously maintain security of the enterprise

    ANALISIS PENERAPAN METODE PENETRATION TESTING PADA KEAMANAN JARINGAN WLAN (Studi Kasus: Universitas Maritim Raja Ali Haji)

    Get PDF
    This test is carried out to find security holes in the Wireless Local Area Network (WLAN) network. In this paper, author simulates attacks on a WLAN network using four attack parameters: Bypassing MAC Authentication, Attacking The Infrastructure and Man In The Middle Attacks. There were four attacks carried out, and two of them were successful. Thus, it can be concluded that the Raja Ali Haji Maritime University (UMRAH) WLAN network is quite secure. Nonetheless, other offensive actions, such as infrastructure attacks or Man In the Middle Attacks, In order to ensure more security, it is necessary to add a DNS Security Extensions protocol to prevent fake DNS redirects, add a firewall to the security system and use TLS on captive portals.Pengujian ini dilakukan dengan mencari celah keamanan pada jaringan Wireless Local Area Network (WLAN). Penulis melakukan simulasi serangan dengan Metode Penetration testing menggunakan tiga parameter serangan yaitu, Bypassing MAC Authentication, Attacking The Infrastructure dan Man In The Middle Attack pada jaringan WLAN dua dari empat serangan yang dilakukan berhasil dijalankan, maka dapat disimpulkan jaringan WLAN Universitas Maritim Raja Ali Haji (UMRAH) sudah cukup aman, namun tidak menutup kemungkinan  terhadap serangan lain seperti Attacking the infrastructure dan Man in the middle Attack, agar keamanan lebih terjamin perlunya penambahan protokol DNS Security Extensions untuk menghalangi pengarahan DNS palsu, penambahan firewall pada sistem keamanan dan penggunaan TLS pada captive portal

    Towards a wireless local area network security control framework for small, medium and micro enterprises in South Africa

    Get PDF
    There is little literature available that is specific to the use of wireless local area network [WLAN) security among small, medium and micro enterprises (SMMEs) in South Africa. This research study developed a framework which may be used by SMMEs for the purposes of securing their WLANs. In view of the fact that the aim of the study was to develop a system for improving information technology security, the study followed a design science approach. A literature review was conducted on security control framework standards and WLAN technologies. The needs of SMMEs regarding WLANs were also established. The result of this process was an artefact in the form of a WLAN Security Control Framework for securing WLANs for SMMEs in South Africa. The suitability of the framework was validated by means of a focus group
    • …
    corecore