Enhancing Wireless LAN Security : A Comprehensive Analysis on Threatsand Vulnerabilities

Authors

  • Bharath Ajay Gorli  New Jersey Institute of Technology, Newark, New Jersey, USA
  • Rithik Reddy Baddam  New Jersey Institute of Technology, Newark, New Jersey, USA
  • Geethika Chowdary Talasila  New Jersey Institute of Technology, Newark, New Jersey, USA

DOI:

https://doi.org//10.32628/CSEIT2390640

Keywords:

Wireless LANs LANs, MFA

Abstract

These days, wireless LANs are found everywhere—from large corporate networks to homes - because they are simple to set up, convenient for employees, don't require expensive wiring, and support continuous mobility. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organization, IT staff, and IT security professionals. We have implemented a time-based one-time password for wireless security lans to protect a network.

References

  1. F. Sheldon, J. Weber, S. Yoo, W. Pan, 'The Insecurity of Wireless Networks.” IEEE Computer Society, vol. 10, no. 4, July/August 2012, pp. 54-61.
  2. L. Wang, B. Srinivasan, N. Bhattacharjee, 'Security Analysis and Improvements on WLANs”, Journal of Networks, vol. 6, no. 3, March 2011, pp. 470-481
  3. N. Sunday, 'Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures”, Thesis (MSc), Blekinge Institute of Technology, 2008.
  4. J. Li, M. Garuba, 'Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities”, Fifth International Conference on Information Technology: New Generations, Las Vegas, Nevada, 7-9 April, 2008, pp. 557-562.
  5. Wakudkar, Sachin D. and Campiglio, Ugo, "MULTI- FACTOR AUTHENTICATION IN WIRELESS NETWORKS"Technical Disclosure Commons, (April 20, 2022)
  6. M. Souppaya, K. Scarfone, 'U.S Department of Commerce - Guidelines for Securing Wireless Local Area Networks (WLANs)”, Gaithersburg, MD 20899-8930: National Institute of Standards and Technology, 2012, SP 800-153.
  7. D. Shiyang,” Compare of New Security Strategy With Several Others in WLAN”, IEEE 2nd International Conference on Computer Engineering and Technology, Chengdu, China, 16-18 April 2010. pp. 24-28.
  8. M. Mathews, R. Hunt, 'Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)”, University of Canterbury, New Zealand.
  9. T. Stimpson, L. Liu, J., Zhang, R. Hill, W. Liu, Y. Zhan, 'Assessment of Security and Vulnerability of Home Wireless Networks”, IEEE 9th International Conference on Fuzzy Systems and Knowledge Discovery, Chongqing, China, 29-31 May, 2012, pp. 2133-21

Downloads

Published

2023-12-30

Issue

Section

Research Articles

How to Cite

[1]
Bharath Ajay Gorli, Rithik Reddy Baddam, Geethika Chowdary Talasila, " Enhancing Wireless LAN Security : A Comprehensive Analysis on Threatsand Vulnerabilities, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 6, pp.316-321, November-December-2023. Available at doi : https://doi.org/10.32628/CSEIT2390640