Kunduz University, Afghanistan
Kunduz University, Afghanistan
* Corresponding author
Kunduz University, Afghanistan
Kunduz University, Afghanistan

Article Main Content

Wireless networks are the most developed progress than other technologies because of cost-effective, flexibility, mobility, and easy deployment. Despite these benefits, wireless networks suffer from different types of challenges and vulnerabilities. During past decades, IEEE, IETF and, Wi-Fi Alliance Institute developed a lot of wireless security protocols including WEP, WPA, WPA2, WPA3, 802.1x standards. Besides, these protocols bring the most solutions for wireless security challenges, still, these protocols are vulnerable against the different types of attacks and threats (Dictionary attacks and Rogue access points). Thus, in this paper after doing a survey and finding the challenges in the case of Afghanistan, I propose solutions regarding specific challenges. The proposed solutions are Kismet and Snort for rogue-AP and dictionary attack detection and prevention. Since these proposed solutions are implemented in the least cost due to open source and free attitude, the proposed solutions are implementable in every Wi-Fi environment in Afghanistan.

References

  1. Lucenius J, Kyntäjä T, and Jormakka H. Security technologies in home and wireless networking environments. Vtt Work. Pap. 2004;10:9–47.
     Google Scholar
  2. Tsitroulis A, Lampoudis D, and Tsekleves E. Exposing WPA2 security protocol vulnerabilities. Int. J. Inf. Comput. Secur. 2014;6(1):93–107. doi: 10.1504/IJICS.2014.059797.
     Google Scholar
  3. Zou Y, Zhu J, Wang X, and Hanzo L. A Survey on wireless security: technical challenges, recent advances, and future trends. Proceedings of the IEEE. 2016;104,(9):1727–1765, doi: 10.1109/JPROC.2016.2558521.
     Google Scholar
  4. Vanhoef M and Piessens F. Key reinstallation attacks: Forcing nonce Reuse in WPA2. Proc. ACM Conf. Comput. Commun. Secur. 2017:1313–1328. doi: 10.1145/3133956.3134027.
     Google Scholar
  5. National Institute of Standards and Technology (NIST), Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i (Special Publication 800-97). Gaithersburg: NIST Special Publication 800-97, 2007.
     Google Scholar
  6. Boncella R. Wireless security: an overview. Cais. 2002;9:269–282.
     Google Scholar
  7. Han L. Wireless Ad-hoc networks 2. Characters challenges of Networks and fundamental wireless Ad-hoc. Networks. 2004: 1–6.
     Google Scholar
  8. Kumkar V, Tiwari A, Tiwari P, Gupta A, and Shrawne S. Vulnerabilities of Wireless security protocols (WEP and WPA2). Int. J. Adv. Res. Comput. Eng. Technol. 2012;1(2):2278–1323.
     Google Scholar
  9. Le TM, Liu RP, and Hedley M. Rogue access point detection and localization. IEEE Int. Symp. Pers. Indoor Mob. Radio Commun. PIMRC. 2012:2489–2493. doi: 10.1109/PIMRC.2012.6362775.
     Google Scholar
  10. Idris NA. Wireless local area network (LAN) security guideline. 2010.
     Google Scholar
  11. Poddar V and Choudhary H. A Comparitive Analysis of Wireless Security Protocols (WEP And WPA2). Int. J. AdHoc Netw. Syst. 2014;4(3):1–7. doi: 10.5121/ijans.2014.4301.
     Google Scholar
  12. Al-Shourbaji I and Al-Janabi S. Intrusion Detection and prevention systems in wireless networks. Kurdistan J. Appl. Res. 2017;2(3):267–272. doi: 10.24017/science.2017.3.48.
     Google Scholar
  13. Fehér DJ and Sándor B. Effects of the WPA2 KRACK Attack in Real Environment. SISY 2018 - IEEE 16th Int. Symp. Intell. Syst. Informatics, Proc. 2018:239–242. doi: 10.1109/SISY.2018.8524769.
     Google Scholar
  14. Tsitroulis A, Lampoudis D, and Tsekleves E. Exposing WPA2 security protocol vulnerabilities. Int. J. Inf. Comput. Secur. 2014;6(1):93. doi: 10.1504/IJICS.2014.059797.
     Google Scholar
  15. Mohamed Refaat T, Kamal Abdelhamid T, and Mahmoud Mohamed A-F. Wireless local area network security enhancement through penetration testing. Int. J. Comput. Networks Commun. Secur. 2016;4(4):114–129.
     Google Scholar
  16. Kerygiannis T and Les O. Wireless network security 802.11, Bluetooth and Handheld Devices, vol. 800–48. Gaithersburg, 2002.
     Google Scholar