Assessment of the effectiveness of the security features of personal wireless networks
Journal Title: Security and Defence Quarterly - Year 2020, Vol 32, Issue 5
Abstract
Wireless network communication standards have become very common due to the huge benefits of their application. The use of radio waves to create networks has reduced infrastructure costs and increased the mobility of devices. The advantages of wireless communication (WLAN) also pose a challenge to the security of transmitted data. However, the use of a wireless signal poses certain threats to network security. The aim of the study was to analyse problems related to the security of WLAN 802.11. and assess its resistance to various attack strategies. It was assumed that wireless networks have an insufficient level of security. The assumed assumption is verifiable due to the ability to monitor events in networks. In order to verify the hypothesis, a number of experiments have been carried out in laboratory conditions, concerning the currently used WLAN protections from the IEEE 802.11 family of standards. The electromagnetic waves used for communication are available to the public at a distance of a few / several dozen metres from the communicating devices. It is easy to monitor air traffic using a network card that operates in monitor mode. The communication itself cannot be secured in any way, so data encryption is one way of secure transmission. During the research, the applied security features were successfully broken with the help of publicly available tools. The obtained results are distinguished by a high level of objectivity and reliability in the assessment of applied wireless network security. It was shown that there are still imperfections in the security and it is possible to break the security measures. The consequences of attacks are very serious and lead to a breach of each of the attributes of secure information. Practice has shown that it is impossible to create a wireless network that is fully secure. The findings of the study should be used to develop methods to improve information security, as well as to raise users’ awareness of existing threats. Not all users of wireless networks are aware of how easy some of the commonly used security features are to break.
Authors and Affiliations
Janusz Gierszewski, Michał Marek Matuśkiewicz
Comparative study regarding the last 25 years of the Croatian Defence Academy “dr. Franjo Tuđman”
Dr. Franjo Tuđman Croatian Defence Academy is a military-educational institution of the Croatian Armed Forces (CAF). Its mission is to prepare and qualify, through education and training, officers, NCOs and civil servant...
Factors that influence the process of migration of youth: A case study of Kosovo
There is no unique definition of migration nor is a simple classification of migration possible either, because of the existence of multi-dimensional migration criteria such as cause, length, distance, direction, volume,...
Participation of V4 countries in African peacekeeping missions
The article explores the peacekeeping activities of Poland, Hungary, the Czech Republic and Slovakia and the characteristics of their activities on the African continent. The paper examines the African peacekeeping missi...
Students of military classes concerning selected aspects of Poland’s national security. An empirical study
This article examines the opinions of students of military classes concerning aspects of Poland’s national security. The main problem of the study is contained in the following question: How do students of military class...
Near-Earth Objects (NEO) and other current space threats
The subject of the study are space threats – Near-Earth Objects (NEO) and Potentially Hazardous Asteroids (PHA). The research methods employed in this article included the classic theoretical methods used in security sci...