Security Evaluation of Wireless Network Access Points

  • Kalniņš R
  • Puriņš J
  • Alksnis G
N/ACitations
Citations of this article
95Readers
Mendeley users who have this article in their library.

Abstract

The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.

Cite

CITATION STYLE

APA

Kalniņš, R., Puriņš, J., & Alksnis, G. (2017). Security Evaluation of Wireless Network Access Points. Applied Computer Systems, 21(1), 38–45. https://doi.org/10.1515/acss-2017-0005

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free