Wireless networks provide an efficient means of connecting network devices. This is because they are fast, cost effective, flexible and easy to use. However, their usage is hindered by a number of challenges, owing to the fact that the physical connections between devices are replaced by logical associations. This means that anybody with a radio detector can receive these signals. Moreover, the data propagation in wireless environment is broadcast in nature and hence propagations can be overheard by anyone within a given range. To address these challenges, authentication protocols have been developed to deter any illicit access to these networks. They include Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). However, these protocols have been shown to be easily compromised, for example due to the utilization of weak initialization vector which leads to collision of the generated hashes. This necessitates the development of more secure mechanisms for protecting the information in transit. The latest effort in securing wireless data propagations involves the usage of the light-fidelity technology. In this paper, a survey of these security technologies given.
Published in | Advances in Wireless Communications and Networks (Volume 1, Issue 4) |
DOI | 10.11648/j.awcn.20150104.11 |
Page(s) | 21-28 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2016. Published by Science Publishing Group |
Light-fidelity, wireless networks, data security
[1] | Abdul, M. (2010), “WLAN Security”, Technical report, IDE1013. |
[2] | Zepnep,G., Halim, A and Ali, M. (2013), “Security Mechanisms and Their Performance Impacts On wireless Local Area Networks”. |
[3] | Karen, S. and Cyrus, T. (2008), “Guide to Security Legacy IEEE 802.11 Wireless Networks”, NIST Special Publication 800-48 Revision 1. |
[4] | Rico, R. (2012), “Wireless Security Wi-Fi Protected Access 2 (WPA2)”. |
[5] | Mustafa and Samani. (2010), “WEP and WPA Improvement”, Wireless Sensor Network. |
[6] | Alexander, G. (2011), “Wired Equivalent Privacy (WEP) Functionality, weak points, Attacks”. |
[7] | Vanhoef, Mathy and Frank. (2013), “Practical Verification of WPA-TKIP Vulnerabilities”, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. |
[8] | Stefan, V. (2011), “Brute forcing Wi-Fi Protected Setup”. |
[9] | Halvorsen and Finn. (2009), “An Improved Attack on TKIP, 5838. pp. 120–132”. |
[10] | Vanhoef, Mathy, Piessens and Frank. (2014), “Advanced Wi-Fi Attacks Using Commodity Hardware”, Proceedings of the 30th Annual Computer Security Applications Conference. |
[11] | Van and Joris. (2010), “WPA key calculation — From passphrase to hexadecimal key”. |
[12] | Strand, L. (2014), “802.1X Port−Based Authentication”. |
[13] | Kak, A. (2014), “Computer and Network Security”. |
[14] | Jason, B. (2011), “Wireless Security”. |
[15] | Jonsson, J. (2010), “On the Security of CTR + CBC-MAC”. |
[16] | Rani, J., Prerna, C and Tripathi, R. (2012), “Li-Fi (Light Fidelity)-The future technology In Wireless communication”, International Journal of Applied Engineering Research. |
[17] | Matthew H. (2013), “Implementation of LiFi Technology”. |
[18] | Rahaim, M and Vegni, B. (2011), “A hybrid radio frequency and broadcast visible light data Propagation system”, In [IEEE Global Communications Conference (GLOBECOM 2011) Workshops]. |
[19] | Suilivian, D. (2012),”Criteria for network security Evaluation”. |
[20] | Chia, T.(2012), “Confidentiality, integrity, Availability: The three components of the CIAT Traid”. |
APA Style
Peter S. Nyakomitta, Wilson K. Cheruiyot, Agnes N. Mindila. (2016). Survey Paper: State of the Art in Secure Wireless Propagation. Advances in Wireless Communications and Networks, 1(4), 21-28. https://doi.org/10.11648/j.awcn.20150104.11
ACS Style
Peter S. Nyakomitta; Wilson K. Cheruiyot; Agnes N. Mindila. Survey Paper: State of the Art in Secure Wireless Propagation. Adv. Wirel. Commun. Netw. 2016, 1(4), 21-28. doi: 10.11648/j.awcn.20150104.11
@article{10.11648/j.awcn.20150104.11, author = {Peter S. Nyakomitta and Wilson K. Cheruiyot and Agnes N. Mindila}, title = {Survey Paper: State of the Art in Secure Wireless Propagation}, journal = {Advances in Wireless Communications and Networks}, volume = {1}, number = {4}, pages = {21-28}, doi = {10.11648/j.awcn.20150104.11}, url = {https://doi.org/10.11648/j.awcn.20150104.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.awcn.20150104.11}, abstract = {Wireless networks provide an efficient means of connecting network devices. This is because they are fast, cost effective, flexible and easy to use. However, their usage is hindered by a number of challenges, owing to the fact that the physical connections between devices are replaced by logical associations. This means that anybody with a radio detector can receive these signals. Moreover, the data propagation in wireless environment is broadcast in nature and hence propagations can be overheard by anyone within a given range. To address these challenges, authentication protocols have been developed to deter any illicit access to these networks. They include Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). However, these protocols have been shown to be easily compromised, for example due to the utilization of weak initialization vector which leads to collision of the generated hashes. This necessitates the development of more secure mechanisms for protecting the information in transit. The latest effort in securing wireless data propagations involves the usage of the light-fidelity technology. In this paper, a survey of these security technologies given.}, year = {2016} }
TY - JOUR T1 - Survey Paper: State of the Art in Secure Wireless Propagation AU - Peter S. Nyakomitta AU - Wilson K. Cheruiyot AU - Agnes N. Mindila Y1 - 2016/03/14 PY - 2016 N1 - https://doi.org/10.11648/j.awcn.20150104.11 DO - 10.11648/j.awcn.20150104.11 T2 - Advances in Wireless Communications and Networks JF - Advances in Wireless Communications and Networks JO - Advances in Wireless Communications and Networks SP - 21 EP - 28 PB - Science Publishing Group SN - 2575-596X UR - https://doi.org/10.11648/j.awcn.20150104.11 AB - Wireless networks provide an efficient means of connecting network devices. This is because they are fast, cost effective, flexible and easy to use. However, their usage is hindered by a number of challenges, owing to the fact that the physical connections between devices are replaced by logical associations. This means that anybody with a radio detector can receive these signals. Moreover, the data propagation in wireless environment is broadcast in nature and hence propagations can be overheard by anyone within a given range. To address these challenges, authentication protocols have been developed to deter any illicit access to these networks. They include Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). However, these protocols have been shown to be easily compromised, for example due to the utilization of weak initialization vector which leads to collision of the generated hashes. This necessitates the development of more secure mechanisms for protecting the information in transit. The latest effort in securing wireless data propagations involves the usage of the light-fidelity technology. In this paper, a survey of these security technologies given. VL - 1 IS - 4 ER -