EXPERIMENTAL DESIGN OF WIRELESS LAN SECURITY PROTOCOLS VULNERABILITY

Project code: CSC838972   |   Pages: 87   |   Words: 4,582   |   Characters: 36,910   |   Format: Word & PDF

ABSTRACT

This paper addresses the theory and reality of Wireless LAN security. It provides an overview of security mechanisms and explains how security works in Wireless LAN networks. An in depth analysis of the Wired Equivalent Privacy (WEP), Wi-Fi protected access (WPA) and WPA2 standards was presented. The security vulnerabilities that exist in them were analyzed and explained. In the investigation, a war driving approach was used. It is observed that about 30% of all WLANs detected during network discovery experiment operate with WEP encryption which further investigated was proved that can be compromised with 100% success. The author discussed the potential consequences that arise from using a weak encryption. Experimental results of penetrating WPA secured network illustrated how easy it is to protect from dictionary attacks by simply using a combination of strong encryption protocol and complex key. The results of the practical part of the project were used to generate guideline in terms of choosing the right encryption method.

Download complete project

CHAPTER ONE: INTRODUCTION

1.1 BACKGROUND OF THE STUDY
A decade ago hardly anyone heard of wireless internet. Today, however, the IT technology is mostly based on the wireless connection followed by the development of wireless network-enabled devices (Cache and Liu, 2010). The manufacturers of the speed network equipment generate billions of pounds, yet a worldwide usage carries a number of risks costing their business staggering amount of money and resources. In Wireless Local Area Networks (WLAN) major issues are associated with the security problems. The wireless signal of the WLAN is broadcasted through the air in all directions simultaneously. An unauthorized user can easily capture this signal using freeware tools to exploit WLAN vulnerability. WLANs are increasingly used within home and business environment due to the convenience, mobility, and affordable prices for wireless devices. WLAN gives mobility and flexibility to users in homes and hot spot environments, such as airports and campuses. The wide range of usage emphasizes the importance of having a secure network and protect from potential break ins. In order to do so, mostly encryptions such as the Wired Equivalent Privacy (WEP) and the Wi-Fi- Protected Access (WPA/WPA2) are used (Kizza, 2011). This allows the transmitted data within the network to be encrypted. Nevertheless, the fact that information is said to be encrypted, does not necessarily mean the hacking specialists can’t access it (Cache and Liu, 2010).
Wireless LAN networks are generally designed with emphasis on convenience rather than security. This is exactly where the problem lies. On a wireless network almost anyone with a WLAN enabled device can easily connect to and penetrate other users systems (Misic, 2008), thus research based and findings will illustrate just how easy it is to protect from malicious attacks by simply using a combination of strong encryption protocol and complex key. The author discusses the potential consequences that arise from using a weak encryption. In order to explore further the findings and results of this study a “war driving” test has been conducted to critically assess the issues associated with security and to examine its current level.
This paper looks at the security tools available for WLANs and their practicality in order to increase security awareness. It demonstrated how to gain unauthorized access to an average wireless network that is using out dated security protocols like WEP. However, the main focus is on the potential risks when using wireless networks and ways to provide an appropriate security.

1.2 STATEMENT OF THE PROBLEM
Many IT communication technologies are based on wireless connections and wireless network-enabled devices. These wireless signals are broadcasted through the air in all directions simultaneously. This has led to major security issues arising because an unauthorized user can easily capture these signals using freeware tools to exploit a company’s Wireless LAN and gain access to confidential information. Thus, there is need to secure a WLAN in the best possible ways

1.3 OBJECTIVES OF THE STUDY
The objectives of this research study is focused on analyzing aspects of wireless LAN security and to demonstrate the effects of potential attacks on secured Wireless networks, and these objectives are as follows:
(I) To conduct in depth research of current wireless LAN security and potential issues associated with security
(II) To examine the current security level of Wireless LAN in Owerri, Imo State, Nigeria, using “War Drive” technique
(III) To conduct an experiment of breaking into networks secured with WEP and WPA so as to expose the flaws of Wireless LAN security protocols
(IV)To recommend possible solutions to improve security in WLAN.

1.4 AREA OF THE STUDY
The area of study for the war driving experiment is Imo State, Nigeria. ImoState is one of the 36 states of Nigeria, and is made up of twenty-seven Local Government Areas with an area of around 5,100 square kilometers. Its capital city is Owerri.
As a result of the vast area of study, Imo State was chosen for the war-driving experiment. It is also believed that it would have a considerable number of companies with wireless network technologies for the research.

1.5 SIGNIFICANCE OF THE STUDY
This research project will be beneficial to a number of individuals, network administrators and groups in the society who are concerned with wireless LAN security issues.
First, the implementation of the recommendations made in the research project will help individuals, groups, network administrators who make use of WLAN to understand and avoid vulnerability of WLAN technology as well as effectively secure their wireless Networks.
Moreover, final year students writing their final year research work on a similar topic can use this research work as a reference material from which they can derive the research format and other relevant information.
Also, other researchers in the field of Information Technology can use this research work as basis for further research work.
Above all, this research will be a valuable asset to libraries, which will stock copies of this research for their readers to borrow.

1.6 SCOPE OF STUDY
This research project will be limited to accessing and discovering the security level of wireless-networks in Owerri, Imo State area of Nigeria by scanning the environment using a war driving technique and attempt breaking into wireless networks secured with (WEP and WPA), which are based on encryption mechanism alone.

1.7 LIMITATIONS OF THE STUDY
The original intentions in regards to this study were highly demanding. Unfortunately, the more advanced the project was the tougher it became to meet the demands due to a short available timescale. Finance was also a barrier to achieving the full expectation of the study.

1.8 STRUCTURE OF WORK
Chapter 1 introduces the project topic and the security issues of wireless LAN technology. The problem that the researcher intends to solve as well as the objectives, scope, limitations, study area and significance of the project study were stated.
In chapter 2, popular WLAN technologies and problems relevant to the research area were detailed down. The aim is to provide an overview of wireless LAN securities and to evaluate the WLAN security issues.
Chapter 3 covers the research methodology used in the project.
In chapter 4, in order to fulfill the research objectives two forms experiments were carried out "WIRELESS NETWORK SECURITY SURVEY (WARDRIVING) and WIRELESS LAN PENETRATION TESTS (WEP/WPA CRACKING)"
In chapter 5, observations and conclusions were reported, and the researcher gave some recommendations on the best way to secure a wireless network from malicious hackers.

Download complete project

Disclaimer: You may browse, read and download any of the Computer Science & Engineering project topics and materials on this website for academic research purposes only. All the Computer Science & Engineering works (on this page) should be used as guidelines, frameworks or as references for your project work. We don't encourage any form of plagiarism. For no reason should you copy word for word.