2,113
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Security Measures in Wired and Wireless Networks

      proceedings-article
      1 , 2 , 1 , 1
      Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009) (ISIICT)
      Innovation and Information and Communication Technology (ISIICT 2009)
      15 - 17 December 2009
      Wi-Fi, WPA2, Wireless, Wired, Networks, WEP, Privacy, Security, Protocol, Models
      Bookmark

            Abstract

            The purpose of this study is to review contemporary wireless network protocols and areas that affect the ability of wireless fidelity (Wi-Fi) technology to secure data transmitted over wireless networks. The research approach takes the form of a case study, in collating the methods used by existing protocols in the implementation of wireless Security Trust Models within their networks. So the paper follows a case study methodology on all the wireless protocols provided by the Institute of Electrical and Electronic Engineers Wireless protected access Wi-Fi protected access; version 2 (WPA2) protocol has provided a more secure means for securing wireless networks but has only provided stronger encryption as it has a longer key which takes longer to decipher. So far, researchers have acknowledged that location privacy is critical to the security of data transmitted by wireless technology. The security reality though, is that even with the implementation of the purportedly secure standards for wireless systems e.g. the 802.1x suite; there are insecure gaps where the information in transit remains in its plain unprotected form for some seconds before it is re-encrypted into another format for transmission. It is at such security holes that the information criminals tend to attack. In this paper, we identify the various security related challenges faced by wireless protocols. This study is useful as it provides lessons for ICT managers, directors, academia and organizations, who wish to develop install or are already using wireless networks within their offices

            Content

            Author and article information

            Contributors
            Conference
            December 2009
            December 2009
            : 113-121
            Affiliations
            [ 1 ]School of Computing and Technology, University of East London, UK

            University of East London, 4 – 6 University Way, London, E16 2RD, England, United Kingdom
            [ 2 ]Centre for Geo Information Studies, University of East London, UK

            University of East London, 4 – 6 University Way, London, E16 2RD, England, United Kingdom
            Article
            10.14236/ewic/ISIICT2009.10
            8cb2d227-93da-4fde-9c19-3563f336589b
            © Anthony C. Ijeh et al. Published by BCS Learning and Development Ltd. Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009), Philadelphia University, Amman, Jordan

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009)
            ISIICT
            3
            Philadelphia University, Amman, Jordan
            15 - 17 December 2009
            Electronic Workshops in Computing (eWiC)
            Innovation and Information and Communication Technology (ISIICT 2009)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ISIICT2009.10
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Wi-Fi,WPA2,Wireless,Wired,Networks,WEP,Privacy,Security,Protocol,Models

            Comments

            Comment on this article