Security measures in wired and wireless networks

  • Authors:
  • Anthony C. Ijeh;Allan J. Brimicombe;David S. Preston;Chris. O. Imafidon

  • Affiliations:
  • School of Computing and Technology, University of East London, UK;Centre for Geo Information Studies, University of East London, UK;School of Computing and Technology, University of East London, UK;School of Computing and Technology, University of East London, UK

  • Venue:
  • ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The purpose of this study is to review contemporary wireless network protocols and areas that affect the ability of wireless fidelity (Wi-Fi) technology to secure data transmitted over wireless networks. The research approach takes the form of a case study, in collating the methods used by existing protocols in the implementation of wireless Security Trust Models within their networks. So the paper follows a case study methodology on all the wireless protocols provided by the Institute of Electrical and Electronic Engineers. Wireless protected access Wi-Fi protected access; version 2 (WPA2) protocol has provided a more secure means for securing wireless networks but has only provided stronger encryption as it has a longer key which takes longer to decipher. So far, researchers have acknowledged that location privacy is critical to the security of data transmitted by wireless technology. The security reality though, is that even with the implementation of the purportedly secure standards for wireless systems e.g. the 802.1x suite; there are insecure gaps where the information in transit remains in its plain unprotected form for some seconds before it is re-encrypted into another format for transmission. It is at such security holes that the information criminals tend to attack. In this paper, we identify the various security related challenges faced by wireless protocols. This study is useful as it provides lessons for ICT managers, directors, academia and organizations, who wish to develop install or are already using wireless networks within their offices.