Vulnerability analysis in wireless local area networks: a survey of some wireless access points in Ghana.

dc.contributor.authorAkomea-Agyin, Kwabena
dc.date.accessioned2017-01-18T08:26:20Z
dc.date.accessioned2023-04-19T12:29:33Z
dc.date.available2017-01-18T08:26:20Z
dc.date.available2023-04-19T12:29:33Z
dc.date.issuedNovember, 2016
dc.descriptionA thesis submitted to the Institute of Distance Learning,Kwame Nkrumah University of Science and Technology In partial fulfillment of the requirement for the Degree of Masters in Information Technology, en_US
dc.description.abstractWireless Communications can be found everywhere including banks, telecommunication companies, hotels, hospitals, academic institutions, government sectors, intelligence organizations, and the military. If these wireless communications are hacked, huge classified data and information will be lost to un-authorized persons globally. This thesis work focused on Wireless Local Area Networks (WLANs). It examined whether there are vulnerabilities in the IEEE 802.11 security protocols of WLANs. If there are vulnerabilities, it further examined whether the vulnerabilities can be used to hack into a WLAN. The IEEE 802.11 standard specified three types of security protocols for WLANs: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and Wi-Fi Protected Access 2 (WPA-2). Hence, this thesis work focused on discovery vulnerabilities in WEP, WPA, and WPA-2 through experiments. A laboratory consisting of two laptops with wireless cards, a wireless access point, and an authentication server was set up to probe into the security protocols. A software called BackTrack 5 was installed on one of the laptops. The software was used to launch various attacks in an attempt to discover vulnerabilities and to retrieve the secret keys of WEP, WPA, and WPA-2 networks. The expectation of this thesis work is to discover a number of vulnerabilities as possible in the IEEE 802.11 Security Protocols of WLANs. Secondly, it is expected to use these vulnerabilities to successfully hack into WLANs.  en_US
dc.description.sponsorshipKNUSTen_US
dc.identifier.urihttps://ir.knust.edu.gh/handle/123456789/9918
dc.language.isoenen_US
dc.titleVulnerability analysis in wireless local area networks: a survey of some wireless access points in Ghana.en_US
dc.typeThesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Thesis work_Kwabena Akomea Agyin_Vulnerability Analysis of W (1)1.pdf
Size:
11.65 MB
Format:
Adobe Portable Document Format
Description:
Full Thesis
License bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.73 KB
Format:
Item-specific license agreed to upon submission
Description:
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: