Order Number |
4245456790 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Running Head: WI-FI SECURITY 1
WI-FI SECURITY 2
Wi-Fi Security: Wireless Network Encryption
Deepika Kashni
11/20/2019
Wi-Fi Security: Wireless Network Encryption
Abstract
The purpose of the project study is to protect the wireless networks from cyber attackers by using an encryption method. The project study employs wireless network encryption to provide a solution to WIFI network users. The increased cases of hacking and other cyber attacks targeting wireless networks have led to exposure and theft of confidential information leading to users lacking confidence on the WIFI network due to vulnerability. The study introduces the use of an encryption method, which assures users that their data is safe and secure from perpetrators. Wireless networks are vulnerable to attacks due to its nature and exposure where an intruder can pull the signal from and access the internet, especially when no precautions are considered (Kaljahi & Jahanshahi, 2016).
A hacker can quickly realize that a wireless network is on through notification from a device, either a mobile phone or a personal computer. The increased attacks on the wireless network inspired my study to provide solutions. Encryption on the wireless network is the best solution where the user limits the access to the network by allowing specific devices based on their Media Access Control (Bhushan & Sahoo, 2017). The methods used include the application of WI-FI Protection Access (WPA) technique that operates by featuring a robust management system integrating authentication and data privacy functions. The generation of temporary integrity access keys requires a successful authentication and through a four-step subsequent handshake between access point and station. The second method is Wired Equivalent Privacy WEP that uses (RC4) algorithm for data encryption in packets protecting from unauthorized access when sent from an access point and decrypted immediately by the user’s network card after being received (Jiang, 2014). The study had immense control over attacks introduced and the idea of unauthorized restriction worked successfully. In conclusion, the encryption method of protecting wireless attacks is appropriate over other methods due to its protection from unauthorized access. Encryption method ensures that the intended receiver only decrypts the confidential message shared through the wireless network.
References
Bhushan, B., & Sahoo, G. (2017). Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks. Wireless Personal Communications, 98(2), 2037-2077. doi: 10.1007/s11277-017-4962-0.
Jiang, Z. (2014). Study of Wi-Fi Security Basing on Wireless Security Standards (WEP, WPA and WPA2). Advanced Materials Research, 1049-1050, 1993-1996. doi: 10.4028/www.scientific.net/amr.1049-1050.1993.
Kaljahi, M., & Jahanshahi, M. (2016). A survey on security vulnerabilities in channel assignment algorithms of multi-interface wireless mesh networks. Security And Communication Networks, 9(18), 5219-5237. doi: 10.1002/sec.1691