Grin logo
de en es fr
Boutique
GRIN Website
Publier des textes, profitez du service complet
Aller à la page d’accueil de la boutique › Informatique - Internet, Nouvelles Technologies

Evaluation of WLAN Security and Performance

Wireless LAN Security

Titre: Evaluation of WLAN Security and Performance

Travail de Recherche , 2012 , 39 Pages

Autor:in: Alikira Richard (Auteur)

Informatique - Internet, Nouvelles Technologies
Extrait & Résumé des informations   Lire l'ebook
Résumé Extrait Résumé des informations

This report addresses the reality of Wireless LAN security and performance. It provides an overview of security mechanisms and explains how security works in Wireless LAN networks. An in depth analysis of the Wired Equivalent Privacy (WEP), Wi-Fi protected access (WPA) and WPA2 standards is presented. The security vulnerabilities that exist in them are analyzed and explained. An experiment involving four devices (Dlink, Linksys, nanostationloco2 and a WBS) was done at Kampala international university. It was discovered from literature that most people prefer using WEP yet it is least secure. One study says 30% of all WLANs detected during network discovery experiment operate with WEP encryption. The study further proved that WEP can be compromised with 100% success. It was also discovered during the experiment that factors such as line of sight, obstruction, distance, antenna type, channel being used all affect network performance. The findings of this experiment can be used as guideline choosing the right encryption method and in designing a WLAN.

Extrait


Table of Contents

CHAPTER ONE

INTRODUCTION

Background

Statement of the problem

Objectives of the study

Main objective

Specific Objectives

Research questions

Scope of the study

Significance of the study

CHAPTER TWO

LITERATURE REVIEW

Wireless LAN Security

WEP - Wired Equivalent Privacy

WPA/WPA2 - Wi-Fi Protected Access

MAC Filtering

Factor that affect wireless LAN performance

Securing a wireless network

CHAPTER THREE

METHODOLOGY

Research design

Study Population

Research instrument

Setup of the experiment

Data collection procedure

Data analysis

3.7 Limitations

CHAPTER FOUR

DATA PRESENTATION AND ANALYSIS

Objective one: To examine the current wireless LAN security issues

Objective two: To identify factors that affect WLAN performance

CHAPTER FIVE

FINDINGS, CONCLUSIONS AND RECOMMENDATIONS

Finding on performance

Conclusion on performance

Recommendations on performance

Findings on security

Conclusions on security

Recommendations on security

Research Objectives and Key Themes

The primary objective of this report is to evaluate Wireless LAN (WLAN) encryption mechanisms and investigate the various factors that impact network performance in real-world environments. The study addresses the vulnerability of common encryption standards and identifies physical and technical conditions that degrade wireless connectivity.

  • Analysis of security vulnerabilities in WEP, WPA, and WPA2.
  • Evaluation of network performance based on signal strength and download speeds.
  • Impact of environmental factors, such as obstacles and distance, on signal propagation.
  • Optimization of WLAN configurations to enhance both security and performance.
  • Practical guidelines for network deployment and security policy management.

Excerpt from the Book

WEP - Wired Equivalent Privacy

As the name suggests, according to Howard and Prince (2010), the objective of WEP designers, was never to make WLAN a 100 per cent secure, but to provide the same security as in a wired network. WEP was built for the encryption of the network traffic, the data integrity and station authentication. And despite its weaknesses, WEP is still widely deployed especially in organizations where security of information is not a very big concern like in schools to allow students to easily connect to university’s hot spots.

According to Beaver and McClure (2010), WEP uses a process of authentication to verify that a valid user is trying to connect to the network. In WEP there are two approaches to do this: open system authentication and shared key authentication. With Open Authentication, when a station wants to connect, the Access point always accepts the request and allows a station to join the network automatically. It uses a device-based authentication scheme as the user does not need to provide a valid user ID or password. Instead, the MAC address of the connecting node is used to identify it. Borisov (2001) in his early research highlights the possibility to configure the MAC addresses of the permitted clients with their access points. However, this approach does not provide the desired security as it is easy to spoof an address.

With Shared key Authentication, when a station requests for a connection, the AP sends a challenge-text in the form of a 40 or 128-bit number. The Station encrypts this text with the WEP secret key, sends it back to the AP which decrypts the text, checks if it is the correct one and then grants access to the network. This process only authenticates the station to the access point, not the other way around; therefore a malicious AP can simply pretend that the authentication was successful without knowing the secret key (Gast, 2005).

Summary of Chapters

CHAPTER ONE: Provides an introduction to wireless networks, outlining the research background, the specific problem of network vulnerabilities, and the study's objectives.

CHAPTER TWO: Reviews existing literature on WLAN technologies, focusing on the security mechanisms WEP, WPA, and WPA2, as well as external factors influencing performance.

CHAPTER THREE: Details the methodology, including the experimental design, the devices tested at Kampala International University, and the procedures for data collection.

CHAPTER FOUR: Presents the collected data and analysis, comparing signal strengths and download speeds under various configurations and environmental conditions.

CHAPTER FIVE: Synthesizes the findings, draws conclusions regarding performance and security, and offers practical recommendations for network administrators and users.

Keywords

WLAN, Security, WEP, WPA, WPA2, Network Performance, Encryption, Signal Strength, MAC Filtering, Data Privacy, Wireless LAN, Authentication, Interference, Access Point, Network Optimization.

Frequently Asked Questions

What is the core focus of this research?

The research examines the realities of Wireless LAN security and performance, evaluating how different encryption methods perform and how environmental factors impact network usability.

What are the primary themes discussed in this report?

The report centers on security mechanisms like WEP and WPA, the impact of physical obstacles on signal strength, and best practices for securing and optimizing wireless networks.

What is the main objective of the study?

The primary goal is to evaluate WLAN encryption mechanisms and identify the specific factors that influence network performance, such as distance and environmental interference.

Which scientific methodology was applied?

A descriptive, longitudinal, and experimental research design was used, involving practical tests on four different wireless devices to measure performance under varying conditions.

What does the main body of the document cover?

The main body covers the theoretical review of encryption, the experimental setup at a university environment, detailed data analysis through tables and graphs, and actionable recommendations for security.

How would you characterize this work using keywords?

The work is best defined by terms such as WLAN, Security, WEP, WPA/WPA2, Network Performance, Signal Strength, MAC Filtering, and Encryption protocols.

How does the distance from an access point affect performance?

The study found that as distance from the access point increases, signal strength consistently drops, leading to significantly higher download times and performance degradation.

What is the recommended approach for securing a wireless network according to the author?

The author recommends using modern encryption like WPA2, implementing MAC filtering, disabling SSID broadcasting, and educating employees on security best practices.

Fin de l'extrait de 39 pages  - haut de page

Résumé des informations

Titre
Evaluation of WLAN Security and Performance
Sous-titre
Wireless LAN Security
Université
Kampala International University  (School of postgraduate studies/computer department)
Cours
Network security
Auteur
Alikira Richard (Auteur)
Année de publication
2012
Pages
39
N° de catalogue
V205389
ISBN (ebook)
9783656331032
ISBN (Livre)
9783656331308
Langue
anglais
mots-clé
evaluation wlan security performance wireless
Sécurité des produits
GRIN Publishing GmbH
Citation du texte
Alikira Richard (Auteur), 2012, Evaluation of WLAN Security and Performance, Munich, GRIN Verlag, https://www.grin.com/document/205389
Lire l'ebook
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
Extrait de  39  pages
Grin logo
  • Grin.com
  • Expédition
  • Contact
  • Prot. des données
  • CGV
  • Imprint