APPLICATION OF WIRELESS COMPUTER NETWORKS AND SECURITY PROBLEMS

Dušan Regodić, Gojko Grubor, Radomir Regodić

Abstract


Modern business conditions and lifestyles have led to commercial expansion and the increase in the number of wireless network users and the emergence of smartphones. In parallel with the increase in the number of users, there is an increasing number of those who are not familiar with security issues. Wireless computer networks carry many security problems with them. Laptop computers, smartphones, tablets, and other devices today can not be imagined without an access to a wireless network.  However, not all users of wireless networks are well-intentioned. There are malevolent people who will use their knowledge of wireless networks, to compromise data sent across the network. They also steal confidential information sent by users, such as credit card numbers, passwords, etc. Therefore, it is necessary to understand the dangers of using wireless networks. As attackers are always a step ahead, it is necessary to work continuously on the protection and security of wireless users. The aim of this paper is to present security issues in wireless computing networks, weaknesses of the infrastructure itself, and insufficient development of security protocols. The social goal of this work is to elaborate about the real problems or threats that wireless network users encounter. The main two problems of the research, numerous weaknesses and security issues in wireless computing networks, are aimed at raising the level of user awareness and improving the insufficient development of the use of security protocols.


Keywords


Wireless network, vulnerabilities, threats, attacks, password

Full Text:

PDF (Serbian)

References


Barnes, C., Bautts T., Lloyd D., Ouellet E., Posluns J., Zendzian D. M., O'Farrell N., (2002), Hack Proofing Your Wireless Network, Syngress Publishing, Rokland.

Beaver, K., & Davis P. T., (2005), Hacking Wireless Networks For Dummies, Wiley Publishing, Indianapolis.

Grubor, G., & Milosavljević M., (2010), Osnove zaštite informacija, Singidunum, Beograd.

Hulin K., Locke C., Mealey P., & Pham, A. (2010). Analysis of Wireless Security Vulnerabilities, Attacks, and Methods of Protection, The University of Texas.

IEEE Std 802.11a-(1999) „Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: High-speed Physical Layer in the 5 GHz Band“.

IEEE Std 802.11b-(1999) „Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band “.

Jie Chen „IEEE 802.11 (part 2)“.

Kumkar V., Tiwari A., Tiwari P., Gupta A., Shrawne S., (2012), Vulnerabilities of Wireless Security protocols, International Journal of Advanced Research in Computer Engineering & Technology.

Nichols R. K., Lekkas P. C., (2002), Wireless Security Models, Threats, and Solutions, The McGraw-Hill Companies, New York.

Ohrtman, F., & Roeder, K. (1999). Wi-Fi Handbook: Building 802.11b Wireless Networks. IEEE Std 802.11, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications“.

Raza M., Iqbal M., Sharif M., Haider W., (2012), World Applied Sciences Journal, IDOSI Publications.

Rufi A., (2006), Network Security 1 and 2 Companion Guide, Cisco Press, Indianapolis.

Wekhande V., (2006), Wi-Fi technology: Security issues,Rivier College, Našua.

Zhang Y., Zheng J., Ma M., (2008), Handbook of Research on Wireless Security, Information Science Reference, London.


Refbacks

  • There are currently no refbacks.