Security Vulnerabilities of Wlan Protocols: A Review

I.C Emeto *

Department of Cybersecurity, Federal University of Technology, Owerri, Nigeria.

U. W. Anthony

Department of Computer Science, University of Port Harcourt, Nigeria.

D. C. Elenwo

Department of Computer Science, College of Fisheries and Marine Technology, Lagos, Nigeria.

A. A Galadima

Department of Computer Science, University of Kashere, Gombe, Nigeria.

C.O Ajayi

Department of Computer Science, University of Kashere, Gombe, Nigeria.

M. S. Hamza

Department of Computer Science, University of Kashere, Gombe, Nigeria.

*Author to whom correspondence should be addressed.


Abstract

This study reviews a significant number of known attacks with the security methods that are currently available for wireless local area networks (WLANs). After a thorough review of more than a dozen literature on the security issues affecting WLANs, it was found that the architecture of the WLAN itself has a vulnerability that hackers can exploit, especially the wired equivalent privacy (WEP) protocol. WLAN attacks are a combination of human and technology behavior. Human network compromise is still a serious danger to wireless technology, although new encryption technologies are being developed to counteract threats, they are not enough to address the issues at hand because hackers are constantly coming up with inventive ways to breach networks and undermine the standards. Therefore, it is advised to integrate more sophisticated and pervasive multidimensional AI algorithms at different wireless protocol layers as well as through certified ethical hacking experimentation standards in order to improve detection capabilities, identify unauthorized entry through their behaviors, and safeguard wireless connections and data.  Also, Cyber security professionals should take note of this report and be proactive in their search for a sophisticated solution to the current issue.

Keywords: WLAN, protocol, networks, detection, attacks, encryption, authentication, WEP


How to Cite

Emeto, I.C, U. W. Anthony, D. C. Elenwo, A. A Galadima, C.O Ajayi, and M. S. Hamza. 2024. “Security Vulnerabilities of Wlan Protocols: A Review”. Asian Journal of Research in Computer Science 17 (9):13-26. https://doi.org/10.9734/ajrcos/2024/v17i9496.