CFP last date
20 December 2024
Reseach Article

Wireless Security in Libya: A Survey Paper

by Salima Benqdara, Abdelfattah Mahmoud
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 35
Year of Publication: 2019
Authors: Salima Benqdara, Abdelfattah Mahmoud
10.5120/ijca2019918309

Salima Benqdara, Abdelfattah Mahmoud . Wireless Security in Libya: A Survey Paper. International Journal of Computer Applications. 181, 35 ( Jan 2019), 26-31. DOI=10.5120/ijca2019918309

@article{ 10.5120/ijca2019918309,
author = { Salima Benqdara, Abdelfattah Mahmoud },
title = { Wireless Security in Libya: A Survey Paper },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2019 },
volume = { 181 },
number = { 35 },
month = { Jan },
year = { 2019 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number35/30260-2019918309/ },
doi = { 10.5120/ijca2019918309 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:08:14.762532+05:30
%A Salima Benqdara
%A Abdelfattah Mahmoud
%T Wireless Security in Libya: A Survey Paper
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 35
%P 26-31
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks have advanced quickly over the most recent of years because of the improvements of new wireless standards and cost-effective wireless hardware. This has prompted broad selection of the innovation in home and private companies. Notwithstanding, the vulnerabilities and threats that wireless networks are exposed to resulted in higher risk for unauthorized users to access the computer networks. This paper assesses the security status of Wireless Local Area Networks (WLAN) use by occupants and coffee houses in two noteworthy city communities of Libya. The objective is to assess the security vulnerabilities that lie underneath the use of WLAN by the general population in Libya. Information will be gathered from different populated locales and will be analyzed to better understand the wireless security awareness among the public.

References
  1. Loo, A. W., "Illusion of Wireless Security," Advances in Computers, Volume 79, (2010), 119-167.
  2. Bulbul, H. I., Batmaz, I., and Ozel, M. (2008). Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected protocols). First international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop (e-Forensics '08), ICST, Brussels, Belgium, Belgium.
  3. Zadig, Sean, M and Tejay, G. (2010). Securing IS assets through hacker deterrence: A case study. In the proceedings of conference on Anti-Phishing Working Groups 2nd Annual e Crime Researchers Summit-eCrime,. 1-7, 2010.
  4. Kalbasi, A., Alomar, O., Hajipour, M., Aloul, F. (2007). Wireless security in UAE: A survey paper. In: Proceedings of the 4th IEEE-GCC Conference; IEEE, Manama, Bahrain.
  5. Chenoweth, T., Minch, R and Tabor, S. "User security behavior on wireless networks: An empirical study", (2007), IEEE.
  6. Sarkar, N., Abdullah, AH. (2011). Exploring wireless network security in Auckland City through war walking field trials. In: Proceeding of the 13th International Conference on Advanced Communication Technology, IEEE. Gangwon-Do, South Korea. 685-689.
  7. Nisbet, A. A. (2013). Study of wireless network security in New Zealand: Are we there yet. In: Proceedings of the 11th Australian Information Security Management Conference, Edith Cowan University, 75-82. Perth, Australia.
  8. Nagashree, R N., Vibha, Rao. ,Aswini, N,"Near Field Communication", IJWMT, VOL.4(2), (2014),20-30, 2014.DOI: 10.5815/ijwmt.
  9. Sebbar, A. SE., Boulahya, G., Mezzour, M., Boulmalf. (2016). An Empirical Study of WIFI Security and Performance in Morocco -WarDriving in Rabat, 2nd International Conference on Electrical and Information Technologies ICEIT.1-6.
  10. Ho, J. T., Dearman, D., Truong, K. N, "Improving Users’ Security Choices on Home Wireless Networks", ACM, (2010). DOI=10.1145/1837110.1837126. [online]. Available :http://doi.acm.org/10.1145/1837110.1837126
  11. Vishal, K., Akhil ,T., Pawan ,T., Ashish, G. and Seema, S., “Vulnerabilities of wireless security protocols (wep and wpa2) ”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), VOL 1(2), ( 2012),34–38.
  12. Mike, M. (2004).Network Guide to Managing & Troubleshooting Networks Lab Manual. McGraw-Hill, Inc., Wi-Fi Protected Access (WPA). Thomas, M. (2004). "Network Security First-Step".Cisco Press, Indiana, USA. ISBN: 1-58720-099-6. p315.
  13. William, S. and Lawrie, B., “Computer security”, Principles and Practice, 2008.
  14. Conklin, W., Williams, D., White, G., Davis,R. and Cothern, C. “Principles of Computer Security,” McGraw Hill Technology Education, (2004).
  15. Air, M. Inc., “Managing WLAN Risks with Vulnerability Assessment: A Technical Whitepaper”, October 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Network Security Wireless LAN SSID WEP WPA WPA2.