Assessment of the effectiveness of the security features of personal wireless networks
Journal Title: Security and Defence Quarterly - Year 2020, Vol 32, Issue 5
Abstract
Wireless network communication standards have become very common due to the huge benefits of their application. The use of radio waves to create networks has reduced infrastructure costs and increased the mobility of devices. The advantages of wireless communication (WLAN) also pose a challenge to the security of transmitted data. However, the use of a wireless signal poses certain threats to network security. The aim of the study was to analyse problems related to the security of WLAN 802.11. and assess its resistance to various attack strategies. It was assumed that wireless networks have an insufficient level of security. The assumed assumption is verifiable due to the ability to monitor events in networks. In order to verify the hypothesis, a number of experiments have been carried out in laboratory conditions, concerning the currently used WLAN protections from the IEEE 802.11 family of standards. The electromagnetic waves used for communication are available to the public at a distance of a few / several dozen metres from the communicating devices. It is easy to monitor air traffic using a network card that operates in monitor mode. The communication itself cannot be secured in any way, so data encryption is one way of secure transmission. During the research, the applied security features were successfully broken with the help of publicly available tools. The obtained results are distinguished by a high level of objectivity and reliability in the assessment of applied wireless network security. It was shown that there are still imperfections in the security and it is possible to break the security measures. The consequences of attacks are very serious and lead to a breach of each of the attributes of secure information. Practice has shown that it is impossible to create a wireless network that is fully secure. The findings of the study should be used to develop methods to improve information security, as well as to raise users’ awareness of existing threats. Not all users of wireless networks are aware of how easy some of the commonly used security features are to break.
Authors and Affiliations
Janusz Gierszewski, Michał Marek Matuśkiewicz
Introduction to the Special Issue ‘Proxy forces in modern warfare’
This article is foreword to the Special Issue ‘Proxy forces in modern warfare’.
Hybrid warfare challenges.
In this article, hybrid warfare challenges and their impact on the evolution of warfare in the new dynamic security environment are analysed. The aim of the research was to identify hybrid threats, explore the complexity...
Improved detection of chemical threats by sensor data fusion
This paper presents some aspects of sensor data fusion that were derived from the EU-SENSE project of the European Commission (Horizon 2020, Grant Agreement No 787031). The aim of EU-SENSE was to develop a novel network...
The essence and the environment of the national security control system of the Republic of Poland.
---------------
Students of military classes concerning selected aspects of Poland’s national security. An empirical study
This article examines the opinions of students of military classes concerning aspects of Poland’s national security. The main problem of the study is contained in the following question: How do students of military class...