TCP behavior across multihop wireless networks and the wired internet
WOWMOM '02 Proceedings of the 5th ACM international workshop on Wireless mobile multimedia
Network layer access control for context-aware IPv6 applications
Wireless Networks
Enemy at the gate: threats to information security
Communications of the ACM - Program compaction
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
Wireless security patch management system
CITC5 '04 Proceedings of the 5th conference on Information technology education
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Wireless security techniques: an overview
Proceedings of the 1st annual conference on Information security curriculum development
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
Peripheral privacy notifications for wireless networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Analyzing the MAC-level behavior of wireless networks in the wild
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
High performance wireless switch protocol for IEEE 802.11 wireless networks
Mobile Networks and Applications
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
The Journal of Machine Learning Research
Measuring e-Commerce Success: Applying the DeLone & McLean Information Systems Success Model
International Journal of Electronic Commerce
Physical concerns for cross-layer prototyping and wireless network experimentation
Proceedings of the second ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
The DeLone and McLean Model of Information Systems Success: A Ten-Year Update
Journal of Management Information Systems
Radio frequency identification prototyping
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness
Information Systems Management
Hi-index | 0.00 |
The purpose of this study is to review contemporary wireless network protocols and areas that affect the ability of wireless fidelity (Wi-Fi) technology to secure data transmitted over wireless networks. The research approach takes the form of a case study, in collating the methods used by existing protocols in the implementation of wireless Security Trust Models within their networks. So the paper follows a case study methodology on all the wireless protocols provided by the Institute of Electrical and Electronic Engineers. Wireless protected access Wi-Fi protected access; version 2 (WPA2) protocol has provided a more secure means for securing wireless networks but has only provided stronger encryption as it has a longer key which takes longer to decipher. So far, researchers have acknowledged that location privacy is critical to the security of data transmitted by wireless technology. The security reality though, is that even with the implementation of the purportedly secure standards for wireless systems e.g. the 802.1x suite; there are insecure gaps where the information in transit remains in its plain unprotected form for some seconds before it is re-encrypted into another format for transmission. It is at such security holes that the information criminals tend to attack. In this paper, we identify the various security related challenges faced by wireless protocols. This study is useful as it provides lessons for ICT managers, directors, academia and organizations, who wish to develop install or are already using wireless networks within their offices.