Enterprise WLAN Security Flaws Current Attacks and relative Mitigations

被引:0
作者
Abo-Soliman, Mohamed A. [1 ]
Azar, Marianne A. [2 ]
机构
[1] Nile Univ, Fac Commun & Informat Technol, Cairo, Egypt
[2] Nile Univ, Natl Telecommun Inst, Cairo, Egypt
来源
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) | 2019年
关键词
EAP; Enterprise WLAN attacks; Mobile Security; Network Access Control; WPA2;
D O I
10.1145/3230833.3230836
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Increasing number of mobiles and handheld devices that allow wireless access to enterprise data and services is considered a major concern for network designers, implementers and analysts. Enhancements of wireless technologies also accelerate the adoptions of enterprise wireless networks that are widely deployed solely or as an extension to existing wired networks. Bring Your Own Device is an example of the new challenging wireless trends. BYOD environments allow the use of personal mobile computing devices like smart phones, tablets, and laptops for business activities. BYOD has become popular in work places since they keep users in their comfort zone leading to higher productivity and cost reduction for businesses. Nevertheless, business data and services are consequentially subject to several wireless attacks, whether they are hosted on a cloud or on premises, especially when travelling through the open air. Corporates usually apply network-access-control systems for securing enterprise wireless LANs. However, the security systems may be compromised due to detected flaws posing the enterprise critical information to leakage or the entire network to interruption or complete failure. In this paper, we study the impact of wireless attacks on enterprise wireless LANs. The study helps in evaluating the real risks that threaten wireless technologies. In additions, recommended mitigations and practices to overcome the detected vulnerabilities and security flaws are proposed.
引用
收藏
页数:8
相关论文
共 28 条
  • [1] Abo-Soliman MA, 2017, 2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), P323, DOI 10.1109/ICENCO.2017.8289808
  • [2] Aked S., 2012, P INT C SEC MAN SAM, P1
  • [3] Alblwi S., 2017, International Conference on Security and Management, P12
  • [4] Andersson H., 2002, PROTECTED EAP PROTOC
  • [5] [Anonymous], 2015, INT J SCI ENG RES IJ
  • [6] [Anonymous], 2008, The transport layer security (TLS) protocol version 1.2
  • [7] Bartoli A., 2018, COMPUTERS SECURITY
  • [8] Next generation IEEE 802.11 Wireless Local Area Networks: Current status, future directions and open challenges
    Bellalta, Boris
    Bononi, Luciano
    Bruno, Raffaele
    Kassler, Andreas
    [J]. COMPUTER COMMUNICATIONS, 2016, 75 : 1 - 25
  • [9] Bongard D., 2014, PASSWORDSCON
  • [10] Bülbül T, 2008, TURK KULT HACI BEKTA, P9