Professional Documents
Culture Documents
Wireless Networks & Security: Exploiting Vulnerabilities in WLAN
Wireless Networks & Security: Exploiting Vulnerabilities in WLAN
Student ID:
Author’s Note:
0
Abstract
Wireless Networks with 802.11 standards is gaining popularity because of its flexibility and
mobility towards accessing information. The current solutions of WLANs are getting exposed
to several security vulnerabilities. After evaluating the 802.11 standard of WLAN, certain
technical issues have been identified in the paper. Finally, it has been recommended to use
WPA2 security protocol for protecting the network of the small company through the use of
256 bits’ encryption technology and changing the secret key periodically.
1
Table of Contents
Introduction................................................................................................................................3
Conclusion..................................................................................................................................4
References..................................................................................................................................5
2
Introduction
As the small company is using wireless access points for providing wireless access to its
staff, it is very significant to check the configuration settings to avoid exploitation of the
possible vulnerabilities [3]. It is recommended to use separate administrator access for the
configuration of the access points and running the firmware. Moreover, the default login
credentials must be changed at the beginning to avoid tampering or unauthenticated access to
the configuration settings [2]. So far, the only risk of using WPA2 encryption is password
attacks, but it can be mitigated by implementing a strong password for the particular small
company network. The significance of a complex password for WLAN is, therefore, cannot
be underrated. The company can use a WLAN key having several characters as possible that
will be case sensitive along with numbers and special characters [5]. The distribution of
characters should be random that will make it more difficult to crack.
3
Justification of the choices
Conclusion
The paper has discussed mainly three categories of technical errors that are linked with a
wireless network, especially the protocols associated with the 802.11 standard. The first flaw
that has been identified is bypassing the authentication while using a hidden SSID and using
MAC filtering by the administrators. This is possible because of the shared secret key
authentication that allows an external agent to discover the SSID through passive scanning.
The second flaw is associated with the WEP and WPA2 encryption algorithm in which the
WEP encryption algorithm can allow attackers to intercept the data. Moreover, the third flaw
is associated with 802.11 clients. The report has also provided some security measures that
need to be implemented by the small company to avoid exploitation of the flaws in the future.
4
References
[1]S. Suroto, "WLAN Security: Threats And Countermeasures", JOIV : International
Journal on Informatics Visualization, vol. 2, no. 4, p. 232, 2018. Available:
10.30630/joiv.2.4.133.
[2]"Research Methods for Cyber Security", Network Security, vol. 2018, no. 6, p. 5, 2018.
Available: 10.1016/s1353-4858(18)30053-9.
[4]Kyaw11, Ar Kar, Zhuang Tian, and Brian Cusack. "Wi-Pi: a study of WLAN security in
Auckland City." IJCSNS 16, no. 8 2016: 68.
[5]Li, June, Kai Yuan, Liang Zhou, Lifang Han, Ling Li, Zhihao Wang, Yinbin Liu, and
Wenbin Huang. "A detection method of WLAN security mechanisms based on MAC frame
resolution." Wuhan University Journal of Natural Sciences 22, no. 2 2017: 93-102.
[6]Alblwi, Samia, and Khalil Shujaee. "A survey on wireless security protocol WPA2."
In Proceedings of the International Conference on Security and Management (SAM), pp. 12-
17. The Steering Committee of The World Congress in Computer Science, Computer
Engineering and Applied Computing (WorldComp), 2017.