Change search
ReferencesLink to record
Permanent link

Direct link
Wireless Security, a practical guide
Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
2012 (English)Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
Abstract [en]

Wireless networks are continuing to grow around the world due to the advantages it offers and all the different services that it provides. In networking environments where the communication goes through a wireless connection, the importance of protecting the private information is a very significant task for network administrators. Beside the great benefits from having this type of network, the major issue of wireless communications is the weak security it provides. Companies and business organizations are more and more involved with the use of wireless networks because of the flexibility, mobility and the scalability it offers, but they are also concerned about the consequences of having a weaker security to protect their expensive investments and information. This thesis discusses the issues behind the security of wireless networks. It explains the background of the wireless networks and describes how the different security algorithms and encryptions work. The authors of this thesis decided to present some of the possible attacks that could occur in wireless networks and also give some security solutions to help others protect their network. The group that worked together on this project had the idea of investigating how secure the actual wireless algorithms and encryptions are. The approach of finding the necessary information for presenting the results and conclusions was to perform penetration tests on wireless networks that were implemented with the three famous security algorithms of WEP, WPA and WPA2. The penetrations tests were performed in lab environments and in home networks with the use of cracking tools. The group used the open source Linux based distribution called BackTrack 5. This operating system provided the group the different cracking tools that would help them perform their investigation. The purpose of performing the penetration tests was to find out the vulnerabilities that each of the security algorithms poses and therefore be able to determine which of them offers the best protection to a wireless network. After the penetration tests were done, the group came up with some solutions by configuring a wireless network with the strongest security options. The solutions were aimed to help others how to configure a specific wireless network in a simple but effective way. The results indicated that the weakest security algorithm would present some major issues for a wireless network. It included a greater possibility of experiencing different network attacks by configuring a wireless network with a weak security algorithm. Overall, this thesis provided the group the necessary information that was beneficial for them to understand how strong a wireless network actually is, and how a penetration test was performed.

Place, publisher, year, edition, pages
2012. , 48 p.
Keyword [en]
Wireless, Security, WLAN, BackTrack, Thesis, Project, Report
National Category
URN: urn:nbn:se:hh:diva-21570OAI: diva2:608041
Subject / course
Computer Network Engineering
2012-12-14, Kristian IV:s väg 3, Halmstad, 13:00 (English)
Available from: 2013-04-18 Created: 2013-02-26 Last updated: 2013-04-18Bibliographically approved

Open Access in DiVA

fulltext(16945 kB)772 downloads
File information
File name FULLTEXT01.pdfFile size 16945 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
School of Information Science, Computer and Electrical Engineering (IDE)

Search outside of DiVA

GoogleGoogle Scholar
Total: 772 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 509 hits
ReferencesLink to record
Permanent link

Direct link