Security threats and countermeasures in WLAN

被引:0
|
作者
Nagamalai, D [1 ]
Dhinakaran, BC
Sasikala, P
Lee, SH
Lee, JK
机构
[1] Hannam Univ, Dept Comp Engn, Taejon 306791, South Korea
[2] Woosong Univ, Dept Comp Sci & Engn, Taejon 300718, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless-the name says it all: "Cut the cord". Today there is no hotter area of development than wireless networking. Enterprizes are rapidly adopting wireless local area networks (WLANs). Driving this rapid adoption is the low-cost and inherent convenience of rapidly deployed connectivity solutions, which are not burdened by a wired infrastructure. WLAN have been in the news quite a lot, recently both from the perspective of growing popularity and in terms of security vulnerabilities that have been discovered in the wired equivalent privacy (WEP) security standard, which is supposed to ensure the security of data that flows over the networks. While wireless LANs are convenient and provide immediate connectivity, they also impose unique management, security, and mobility challenges on network. Though "connect anywhere at anytime" promise of the wireless networks is beginning to become popular; there are a plenty of confusion among prospective users when it comes to security. Because WLAN impose such significant challenges, should all 802.11 networks be considered hostile to the prospective user? Not necessarily. A well-designed wireless LAN ensures that the network is well protected and easy to manage, without sacrificing the wireless user's ability to roam seamlessly. This is a survey paper that focuses on the catalog of security risks and countermeasures of the wireless network. We describe the standard mechanisms available for authentication of users and the protection of the privacy and integrity of the data. A basic analysis of each security countermeasure is conducted by looking at the attack techniques addressed by the mechanism. Our analysis takes into account the perspective of both insiders and outsiders.
引用
收藏
页码:168 / 182
页数:15
相关论文
共 50 条
  • [31] A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures
    Swessi, Dorsaf
    Idoudi, Hanen
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1557 - 1592
  • [32] Security Threats and Countermeasures in Three-Dimensional Integrated Circuits
    Dofe, Jaya
    Gu, Peng
    Stow, Dylan
    Yu, Qiaoyan
    Kursun, Eren
    Xie, Yuan
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 321 - 326
  • [33] The molecularisation of security: medical countermeasures, stockpiling and the governance of biological threats
    Harman, Sophie
    INTERNATIONAL AFFAIRS, 2023, 99 (02) : 865 - 866
  • [34] Security threats and countermeasures of MAC layer in cognitive radio networks
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    AD HOC NETWORKS, 2018, 70 : 85 - 102
  • [35] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530
  • [36] A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis
    Rugo, Alessio
    Ardagna, Claudio A.
    Ioini, Nabil El
    ACM Computing Surveys, 2022, 55 (01):
  • [37] Security Challenges for Drone Communications: Possible Threats, Attacks and Countermeasures
    Krichen, Moez
    Adoni, Wilfried Yves Hamilton
    Mihoub, Alaeddine
    Alzahrani, Mohammed Y.
    Nahhal, Tarik
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 184 - 189
  • [38] Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures
    Mawgoud, Ahmed A.
    Taha, Mohamed Hamed N.
    Khalifa, Nour Eldeen M.
    Loey, Mohamed
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2019, 2020, 1058 : 912 - 921
  • [39] Security threats and countermeasures in military 5G systems
    Sliwa, Joanna
    Suchanski, Marek
    2022 24TH INTERNATIONAL MICROWAVE AND RADAR CONFERENCE (MIKON), 2022,
  • [40] Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures
    Mo, Kanghua
    Ye, Peigen
    Ren, Xiaojun
    Wang, Shaowei
    Li, Wenjun
    Li, Jin
    ACM COMPUTING SURVEYS, 2024, 56 (06)