2011
DOI: 10.19030/jabr.v20i4.2221
|View full text |Cite
|
Sign up to set email alerts
|

Deployment Issues And Security Concerns With Wireless Local Area Networks: The Deployment Experience At A University

Abstract: This paper presents and discusses various issues pertaining to the deployment of Wireless Local Area Networks (WLANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Furthermore, the organization should implement continuous attack and vulnerability monitoring and perform periodic technical security assessment to measure overall security of the WLAN [5]. The use of strong encryption standards protect WLANs from the worst threats.…”
Section: Securing a Wireless Lanmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the organization should implement continuous attack and vulnerability monitoring and perform periodic technical security assessment to measure overall security of the WLAN [5]. The use of strong encryption standards protect WLANs from the worst threats.…”
Section: Securing a Wireless Lanmentioning
confidence: 99%
“…So packets encryption should be tackled according to the types of attacks after analysis. Analysis of attack should be taken in order to the type of attack explained in section [5].…”
Section: Minimizing Riskmentioning
confidence: 99%
“…The IV is sent in the packet along with the data. Once the encrypted packet reaches the receiving end, it decrypts the packet using the same session key [12].…”
Section: Wlan Vulnerabilitiesmentioning
confidence: 99%
“…Thus, if any devices are lost or stolen, the higher the chances of the key being compromised. This exposes the whole system to security breaches [12]. More importantly, the encryption algorithm RC4 used in WEP is flawed and encryption keys can be recovered through cryptanalysis [8].…”
Section: Wlan Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation