A Critical Analysis of the Efficiencies of Emerging Wireless Security Standards Against Network Attacks

Karolis Vilius, Lu Liu, John Panneerselvam, T. Stimpson
{"title":"A Critical Analysis of the Efficiencies of Emerging Wireless Security Standards Against Network Attacks","authors":"Karolis Vilius, Lu Liu, John Panneerselvam, T. Stimpson","doi":"10.1109/INCoS.2015.56","DOIUrl":null,"url":null,"abstract":"Given the emergence of the wireless technologies in the recent past, their utilities in both home and industrial applications have taken new shapes in various dimensions. Along with this progressive growth is the substantial emergence of the network attackers as they are finding new bases and platforms for launching network attacks. Existing wireless security standards are not persistent enough under the lights of the emerging malicious attackers. Since the first implementation of wireless networks, it was noticed that the original WEP encryption methods had flawed security which led to the industry searching for new solutions to secure wireless communications. Whilst enterprises were able to take advantage of these developments, many home users were unaware of the dangers posed by weak wireless encryption and are continued to employ vulnerable encryption. Thus it has become a necessity to explore and reveal the current security trends and their efficiencies against the present form of the network vulnerabilities from time to time. To this end, this paper delves into the background of weak encryption protocols and identifies the risks and countermeasures for protecting wireless networks against attacks. This research also includes the analysis on the data collected from scanning the wireless networks in the city of Derby in the United Kingdom. An important outcome of this research work is the critical evaluation of the security standards along with the recognition of the encryption protocol patterns in existence from 2006 to 2015.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2015.56","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Given the emergence of the wireless technologies in the recent past, their utilities in both home and industrial applications have taken new shapes in various dimensions. Along with this progressive growth is the substantial emergence of the network attackers as they are finding new bases and platforms for launching network attacks. Existing wireless security standards are not persistent enough under the lights of the emerging malicious attackers. Since the first implementation of wireless networks, it was noticed that the original WEP encryption methods had flawed security which led to the industry searching for new solutions to secure wireless communications. Whilst enterprises were able to take advantage of these developments, many home users were unaware of the dangers posed by weak wireless encryption and are continued to employ vulnerable encryption. Thus it has become a necessity to explore and reveal the current security trends and their efficiencies against the present form of the network vulnerabilities from time to time. To this end, this paper delves into the background of weak encryption protocols and identifies the risks and countermeasures for protecting wireless networks against attacks. This research also includes the analysis on the data collected from scanning the wireless networks in the city of Derby in the United Kingdom. An important outcome of this research work is the critical evaluation of the security standards along with the recognition of the encryption protocol patterns in existence from 2006 to 2015.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
新兴无线安全标准对网络攻击效率的关键分析
鉴于无线技术在最近的出现,它们在家庭和工业应用中的效用在各个方面都呈现出新的形式。伴随着这种逐渐增长的是网络攻击者的大量出现,因为他们正在寻找新的基地和平台来发动网络攻击。在新出现的恶意攻击者的光芒下,现有的无线安全标准不够持久。自从第一次实现无线网络以来,人们注意到原来的WEP加密方法存在安全性缺陷,这导致业界寻找新的解决方案来保护无线通信。虽然企业能够利用这些发展,但许多家庭用户没有意识到弱无线加密带来的危险,并继续使用易受攻击的加密。因此,有必要不时地探索和揭示当前的安全趋势及其对当前形式的网络漏洞的有效性。为此,本文深入研究了弱加密协议的背景,识别了保护无线网络免受攻击的风险和对策。本研究还包括对扫描英国德比市无线网络收集的数据进行分析。这项研究工作的一个重要成果是对安全标准的关键评估以及对2006年至2015年存在的加密协议模式的识别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Preliminary Investigation of a Semi-Automatic Criminology Intelligence Extraction Method: A Big Data Approach Energy-Efficient Link and Node Power Control for Avoidance of Congestion in Accordance with Traffic Load Fluctuations Differential Evolution Enhanced by the Closeness Centrality: Initial Study Towards a Kansei WordNet by Color Design SNS Evaluation Minimum Background Fairness for Quality Video Delivery over the LTE Downlink
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1