A vulnerability model for wireless local area networks in an insecure war driving setting
Kirongo, Amos C.
MetadataShow full item record
Wireless local area networks (WLAN) enable access to computing resources for devices that are not physically connected to a network infrastructure. WLANs usually function in a restricted geographical location such as a workplace. They are effected as additions to current wired local area networks to improve operator movement. These networks require to be secured from vulnerabilities including eavesdropping which result from wardriving. The main goal is to understand how vulnerability of wireless networks in a wardriving setting can be mitigated through simulation of a vulnerability model using Artificial Neural Networks. It is with this understanding that nationally and internationally WLANs security is a priority with relation to data security. The Kenyan government in its vision focuses on the development of a National framework for Information and Cyber Security through a proactive approach to the country's security needs to ensure security of the upcoming National Next Generation Broadband network and securing of the proposed National Cloud computing platform for use by both private and public sectors. It also focuses on securing the implementation of the National Open Data and strategic Data Programme. The government is further investing in public key infrastructure to secure the national networks. With this in mind the researcher embarked on a survey based on the Vulnerability of WLANs in Meru Town of Meru County in Kenya. The survey revealed that most of the users of WLANs that had installed the networks had not secured their networks appropriately, since most were open, while others used default SSIDs. Further vulnerability of AP devices with relation to manufacturer popularity was identified with associated encryption modes. This research developed a conceptual framework for Wireless Local Area Networks Security management strategies in a wardriving setting and tested it founded on experimental substantiation.