Beruflich Dokumente
Kultur Dokumente
Securing WLAN
Introduction
Nowadays, wireless network has been widely used throughout various different sectors
as the result of the system’s cost-of-ownership that is greatly reduced, installation process that
is easy and simple as well as its flexibility, portability and scalability. Not to mention that in
today’s world, Wi- Fi network can practically be easily accessed through cameras, game
consoles, laptops, mobile phones and of course many other consumer electronic gadgets. This
has since brought a great impact on our daily lives since Wireless Local Area Network
technology or better known as WLAN in short has changed the ways of communication and
information sharing (Dhiman, 2014). The situation that acted as the key factor for this is
basically the elimination of the barriers for such activities which includes the distance and
location involved in the process. As the result, wireless networking usage has been growing
rapidly as more and more users extended their typical wired local area networks (LAN) to
include WLAN.
It is undeniable such situation had led WLANs to go through rapid changes in recent
years. These changes were mainly performed for the purpose of further improving and
strengthening the security architecture of WLAN. One of the views on these changes covered
the incorporation of current WLANs under the already existing umbrellas of virtual private
network or VPN in short. This however is to be viewed as a mere alternative access method,
thus, conserving the existing infrastructure of the VPN. In addition to this, another view on the
changes for WLANs involved the security of the airwaves to be addressed. This is in
conjunction to the fact that the security of the airwaves had been proven to be extremely
vulnerable. As the matter of fact, the security standardisation has been evolving in accordance
to the work of the IEEE in evolving from WEP to WPA. This development had since presented
a new key management and integrity mechanisms through to IEEE 802.11i or better known as
WAP2. This development of WAP2 maintained WPA’s management and integrity
mechanisms while simultaneously introduced advanced encryption standard or AES and
moved most of the functionality in regard to security to the hardware (Mathews & Hunt, 2007).
In conjunction to this, the development and evolution of security architecture of WLAN will
further be discussed and explained in this current study.
Table 1: Search Query variation for every database used in this study.
1
evolution” AND “WLAN”
OR “wireless local area
networks”
Emerald Insight “security architecture 536
development” OR “security
architecture evolution” AND
“WLAN” OR “wireless
local area networks”
Science Direct “security architecture 3,132
development” OR “security
architecture evolution” AND
“WLAN” OR “wireless
local area networks”
For the purpose of assisting the direction of this study, several relevant studies have
been collected with the usage of a set of search strings constructed at the initial stage of the
research through the extrapolation of the key terms determined to be used in the study. The
selected key terms used for this study are “security architecture development” OR “security
architecture evolution” AND “WLAN” OR “wireless local area networks”. Table 1 above
shows the queries developed based on these keywords to search for relevant studies on the
database mentioned. Table 2 as shown below on the other hand, presents the distribution of the
focus of the studies selected for this current research.
Conclusion
Conclusively, a deduction can be made on the fact that an organisation will have to
comprehend the significance of current security threats posed on the wireless networks. In
addition to this, it is also important for the organisation to understand the needs for the
implementation of strong protection against the potential attacks on the wireless network that
a corporate WLAN might be faced. The development of several new security standards such
as 802.11i, WPA and WPA2 helps to offer varying degrees of protection. Due to this,
organisations will have to understand each of the standards and decides on which is considered
to be the most feasible for them.
References
Al Naamany, A. M., Shidhani, A. & Bourdoucen, H., 2006. IEEE 802.11 wireless LAN
security overview. International Journal of Computer Science and Network Security, 6(5B),
pp. 138-186.
Arbaugh, W. A., Shankar, N. & Wan, Y. J., 2001. Your 802.11 Wireless Network has No
Clothes. pp. 1-13.
Berghel, H. & Uecker, J., 2004. Wireless infidelity II: airjacking. Communications of the ACM,
47(12), pp. 15-20.
Borisov, N., Goldberg, I. & Wagner, D., 2001. Intercepting Mobile Communications: The
Insecurity of 802.11. Rome, ACM SIGMOBILE.
Borisov, N., Goldberg, I. & Wagner, D., 2001. Security of the WEP Algorithm. [Online]
Available at: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html.
Cam-Winget, N., Housley, R., Wagner, D. & Walker, J., 2003. Security flaws in 802.11 data
link protocols. Communications of hte ACM, 46(5), pp. 35-39.
Choi, Y. B., Muller, J., Kopek, C. V. & Makarsky, J. M., 2006. Corporate wireless LAN
security: threats and an effective security assessment framework for wireless information
assurance. International Journal of Mobile Communications, 4(3), pp. 266-290.
Dhiman, D., 2014. WLAN Security Issues and Solutions. IOSR Journal of Computer
Engineering, 16(1), pp. 67-75.
Feng, P., 2012. Wireless LAN security issues and solutions. s.l., s.n.
Fluhrer, S., Mantin, I. & Shamir, A., 2001. Weakness in the Key Scheduling Algorithm of RC4.
Selected Areas of Cryptography, Volume 2259, pp. 1-24.
Hamid, R. A., 2003. Wireless LAN: Security Issues and Solutions, s.l.: SANS Institute.
Housley, R. & Arbaugh, W., 2003. Security problems in 802.11-based networks.
Communication of the ACM, 46(5), pp. 31-34.
Liu, C. & Yu, J., 2008. Rogue access point based dos attacks against 802.11 WLAN. s.l., s.n.
Mathews, M. & Hunt, R., 2007. Evolution of Wireless LAN Security Architecture to IEEE
802.11i (WPA2). Phuket, ACTA Press Anaheim, pp. 292-297.
Mendez, G. A., Silva, L. C. D. & Punchihewa, A., n.d. Review of Present IEEE 802.11 “Wi-
Fi” Security Issues and of Other Possible Vulnerabilities, New Zealand: Institute of
Information Sciences & Technology.
Stubblefield, A., Ioannidis, J. & Rubin, A., 2004. A key recovery attack on the 802.11b wired
equivalent privacy protocol. ACM Transactions on Information and System Security (TISSEC),
7(2).
UBM, 2004. Examining 802.11i and WPA. [Online]
Available at: https://www.networkcomputing.com/wireless/examining-80211i-and-
wpa/1094618365/page/0/6
Woody, A., 2013. Enterprise Security: A Data-Centric Approach to Securing the Enterprise.
Birmingham: Packt Publishing Ltd.
Yasir, Z. & Yang., T., 2004. Wireless LAN security and laboratory designs. Journal of
Computing Sciences in Colleges, 19(3), pp. 44-60.
Ye, P. & Yue, G., 2010. Security Research on WEP of WLAN. Jinggangshan, s.n.
Appendix A: Feature Comparison of Security Protocol
Table 3: Feature comparison of WLAN's security protocol (Mathews & Hunt, 2007).
Security
Method WPA2 (802.11i) WPA WEP
Property
Enforce IV Enforce IV
Replay Detection None
sequencing sequencing
Appendix B: Rate of Interest in the Development of WLAN’s Security
Architecture
Publication Year
4.5
4
3.5
3
Paper
2.5
2
1.5
1
0.5
0
Axis Title
Publication Year