Show simple item record

dc.contributor.authorMwenja, Joyce M.
dc.date.accessioned2020-08-22T08:30:38Z
dc.date.available2020-08-22T08:30:38Z
dc.date.issued2013-09-10
dc.identifier.urihttp://41.89.49.50/handle/123456789/89
dc.description.abstractFor several decades security and wireless communication will remain to be interesting research areas. Change in technology enables the need of ease of use and flexibility of communications in the computer world without manipulating the existing content. This study seeks to illustrate various concepts of critical to securing data over wireless networks, and overall security of the networks.In order to demonstrate wireless security, it is important to highlight key specifications of the common security standards in existence such as 802.11 WEP, 802.11 WPA, and WPA2 (802.11i). In the same light, the study explores the concept of Wireless Metropolitan Access Network and its security specifications besides vulnerability to security breach. Finally, the study sums up with reflections and recommendations about wireless network security, along with ample proposals to enhance wireless security especially in a public setting.There is much regulatory and standards work in the area of network security, especially in wireless network. The wireless LAN standard IEEE 802.11b provides a mechanism for authentication and encryption. This paper describes the security of Wireless Local Area Networks based on the IEEE 802.11 standard commonly referred to as Wi-Fi Networks or WLANs. Similarly, the study examined works by other researchers with regard to security in a wireless network, and addresses current wireless security measures. It was established that the measures indicated by these researchers were largely unsatisfactory, owing to advances in technology that serve to compromise measures employed. The researcher analyzed different tools that used, to attack a wireless network and successfully identified various types of attacks by highlighting some loopholes in WLAN. The study concluded that wireless networks cannot be made completely secure, and should only be used to serve the needs of the organizations, rather than one of convenience. As per this findings and conclusion, the study recommends the adoption of measures serve to improve the security at a wireless deployment site.en_US
dc.language.isoenen_US
dc.subjectSecurity, Wireless LAN, Infrastructure, Attacks, Vulnerabilityen_US
dc.titleFramework for securing wireless local area networken_US
dc.typeThesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record