Assessment and Test-case Study of Wi-Fi Security through the Wardriving Technique

Author:

Etta Victor Ojong1ORCID,Sari Arif1,Imoize Agbotiname Lucky23ORCID,Shukla Piyush Kumar4ORCID,Alhassan Musah5ORCID

Affiliation:

1. Department of Management Information Systems, Girne American University, Karmi, Northern Cyprus, Turkey

2. Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka 100213, Lagos, Nigeria

3. Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, Bochum 44801, Germany

4. Department of Computer Science & Engineering, UIT, RGPV, Bhopal 462033, MP, India

5. Electrical Engineering Department, University of Development Studies, School of Engineering, Nyankpala Campus, Tamale, Ghana

Abstract

This study aims to investigate Wireless Local Area Network (WLAN) within the context of its applicability as a 21st-century business tool and its survivability in a security threat-infested cyber landscape. WLAN security leverages the Wardriving technique deployed within geolocation to scan for WLAN density and explore the associated security mechanisms. Specifically, the study adopts two approaches; the first part reviews relevant research articles in electronic libraries and databases on WLAN security based on wardriving techniques. The other part comprises a measurement campaign conducted in a mid-sized city in North Cyprus. The field measurement aims to underscore the claims from the literature to find out how the security encryption technologies are used. In particular, the goal is to determine the availability of WLAN infrastructure and monitor how the security measures are implemented in Northern Cyprus. The main objective is to determine the security state of WLAN in Cyprus and examine how it can be generalized for related environments. In order to completely grasp the research issue posed in this study, data analyses from several perspectives are analyzed and examined critically. The wardriving approach has been used in this work to crawl wider regions for examination. This study was conducted with security findings drawn only from publicly accessible information emitted by each investigated wireless access point. The channel usage, Service Set IDentifier (SSID) security, the Encryption type (Open, WEP, WPA, WPA2, WPA3, and Mixed mode), WPS usage statistics, geographical locations, detailed security statistics described in Wigle CSV format, and vendor statistics are highlighted. Generally, results indicate that 21,345 WLANs were detected. From the detected WLANs, 23 (0.1 percent) used WEP encryption, 18 (0.08 percent) used WPA-TKIP encryption, 5,359 (25.1 percent) were unencrypted, and a clear majority of 9,139 (42.82 percent) used the more secure WPA2 encryption, while 13 networks (0.06 percent) used the latest WPA3 encryption technique. The results imply that WLAN security in Cyprus can be said to be moderate. Thus, this study adds to the expanding corpus of research on WLAN security and Wardriving to all parties in the wireless security ecosystem. The current study examines WLAN operations in North Cyprus while pointing to future research directions on Wireless LAN security mechanisms. Overall, the dataset from the wardriving experiment is novel and would serve future research exploration in the wireless security systems domain.

Funder

Petroleum Technology Development Fund

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Computer Science Applications

Reference117 articles.

1. Value of wi-fi;W-F Alliance,2022

2. Conceptual model of security variables in wi-fi wireless networks: review;G. Lorena

3. Exploring the use of IoT and WiFi-enabled devices to improve fingerprinting in indoor localization;A. Hilal

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A survey and characterization of Close Access Cyberspace Operations;International Journal of Information Security;2023-11-03

2. Retracted: Assessment and Test-Case Study of Wi-Fi Security through the Wardriving Technique;Mobile Information Systems;2023-08-09

3. Automatic Verification and Execution of Cyber Attack on IoT Devices;Sensors;2023-01-09

4. IoTBeholder;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2022-03-27

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3