A COMPREHENSIVE RESEARCH PAPER ON THE IN-DEPTH ANALYSIS OF WI-FI NETWORK SECURITY AND THE IDENTIFICATION OF POTENTIAL THREATS

Authors

  • Teg Singh Research Scholar, Career Point University, Alaniya Kota, Rajasthan, India
  • Dr. Rajesh Chauhan Assistant Professor, UIIT, HPU, Shimla, Himachal Pradesh, India

DOI:

https://doi.org/10.29121/shodhkosh.v5.i3.2024.1740

Keywords:

Wi-Fi Security, Network Vulnerabilities, Wireless Communication, Cybersecurity, Encryption, WEP, WPA, Access Control, Data Protection, Network Threats, Attacks, OPNET, Integrity, Hacking, Case Studies

Abstract [English]

This research paper delves into the critical aspects of Wi-Fi network security, providing a thorough analysis of the vulnerabilities and risks associated with wireless networks. As Wi-Fi technology continues to expand globally, ensuring robust security measures has become increasingly vital to protect sensitive data and maintain the integrity of network communications. The paper explores the various security protocols employed in Wi-Fi networks, evaluates their effectiveness, and highlights the common threats that these networks face, including unauthorized access, data interception, and cyber-attacks.
Through a detailed examination of case studies and current security practices, the paper identifies potential weaknesses in existing Wi-Fi security frameworks and proposes strategies for mitigating these risks. By addressing both technical and practical considerations, this research aims to contribute to the ongoing efforts to enhance Wi-Fi network security, ensuring safer and more reliable wireless communication in both personal and professional environments. Recent tools and methods have proven to be beneficial in the research study area, with a particular focus on utilizing tools like OPNET. The study emphasizes the hardware requirements necessary for conducting MANET and OPNET simulations, which are crucial for enhancing network security and developing robust mechanisms to defend against attacks and hacking attempts. Researchers must employ powerful hardware systems, scalable techniques, and advanced simulators to meet the high computational demands of modern state-of-the-art application domains.

References

Aneja Akshika, Sodhi Garima (2016)”,” A Study of Security Issues Related With Wireless Fidelity (WI-FI )”,International Journal of Computer Science Trends and Technology (IJCST) – Volume 4 Issue 2, ISSN: 2347-8578 www.ijcstjournal.org.

ttps://www.elprocus.com/how-does-wifi-work/

ekhande Vandana (2006),” WI-FI TECHNOLOGY: SECURITY ISSUES “RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, ISSN 1559-9388.

ttps://www.tutorialspoint.com/wi-fi/wifi_ieee_standards.htm

ttps://www.tutorialspoint.com/wi-fi/wifi_service_quality.htm

ong Shagun, Biju (2014), “ANALYSIS OF WIFI AND WIMAX AND WIRELESS NETWORK COEXISTENCE” International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, pp. 64-65. DOI: https://doi.org/10.5121/ijcnc.2014.6605

itesh Sai, Kakkar Ashna (2016), “International Journal of Advanced Research in Computer Science and Software Engineering Research Paper , Volume 6, Issue 3.

han H. Afaq, Qadeer A. Mohammed(2009),” 4G as a Next Generation Wireless Network”.

umar Ashish, Aswal Ankit, Singh Lalit (2013),” 4G Wireless Technology: A Brief Review”, Quoted in International Journal of Engineering and Management Research, Volume-3, Issue-2, ISSN No.: 2250-0758 , Pages: 35-43. Available at: www.ijemr.net.

Ghazal Shatha, S Alkhlailah Raina (2016),” 5th Generation Wi-Fi”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 8. DOI: https://doi.org/10.17148/IJARCCE.2016.5801

Alawi Dr. (2006) ,” WiFi Technology: Future Market Challenges and Opportunities “,Journal of Computer Science 2 (1): 13-18, ISSN 1549-3636. DOI: https://doi.org/10.3844/jcssp.2006.13.18

Enad nassar, Muhanna (2013),” Computer Wireless Networking and Communication “International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, IJARCCE .

Helen D., Arivazhagan D. (2014),” Applications, Advantages and Challenges of Ad Hoc Networks” Journal of Academia and Industrial Research (JAIR), Volume 2, Issue 8.

Salfi Rahman, Ur Mohsin (2015),” A STUDY OF MOBILE AD-HOC NETWORKS -ISSUES AND CHALLENGES” International Journal of Advanced Research in Computer Science, 93-96 Available Online at www.ijarcs.info.

Singh Teg, Chauhan Rajesh(2019), “A Review Paper of Dropping the Consequence of Jellyfish Attack in MANET using AODV and OLSR Routing Protocol” , INTERNATIONAL JOURNAL OF RESEARCH IN ELECTRONICS AND COMPUTER ENGINEERING A UNIT OF I2OR, VOL. 7 ISSUE 2 , ISSN: 2348-2281

Khan Ruzaina ,Hasan Mohammad (2017),” NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW”, quoted in International Journal of Advanced Research in Computer Science RESEARCH PAPER , Volume 8, No.8. DOI: https://doi.org/10.26483/ijarcs.v8i8.4641

G. Poornima, Mr. M. Raja Senathipathi (2013),” REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, 2281 www.ijarcet.org.

Chithik M., Yasin Mohamed, Ponnurajan P. (2011)” A Review on Ad-hoc Network Security”, International Journal of Mathematics and Computational Methods in Science & Technology, Vol. 1, No.6

Sonu (2016),” The Review Paper on Securing Wireless Network from External Threats”, International Journal of Computer Science and Mobile Computing, Vol.5 Issue.5.

Parte Smita, Pandya Smriti (2012),” A Comprehensive Study of Wi-Fi Security – Challenges and solutions”, INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH, VOLUME 3, ISSUE 8.

Sharma Nidhi. , Sharma R.M. (2010),”Provisioning of Quality of Service in MANETs Performance Analysis &Comparison (AODV and DSR)”. 978-1-4244-6349- 7/10 IEEE.

Pandey Shailja (2011),” MODERN NETWORK SECURITY: ISSUES AND CHALLENGES, quoted in International Journal of Engineering Science and Technology (IJEST), ISSN: 0975-5462 Vol. 3 No.

Om prakash (2011), “wireless home security system with mobile”, Quoted in international journal of advanced engineering technology, Volume 2, issue 4.

Promila, Chhillar Dr. R. S. (2012), “Review of Wi-Fi security Techniques”, Quoted in International Journal of Modern Engineering Research (IJMER), Volume 2, issue.5.

Alsoufi Delan, Elleithy Khaled, Abuzaghleh Tariq and Nassar Ahmad (2012), “Security in Wireless Sensor Networks”, Quoted in International Journal of Computer Science & Engineering Survey (IJCSES), Volume3, and No.3. DOI: https://doi.org/10.5121/ijcses.2012.3301

Vamsi Ram, Venkaterwarlu Bala (2012),”Network security management in wireless networks through zero knowledge proof”, quoted in international journal of advanced research in computer science and software engineering, Volume 2, Issue 9.

Kour Parmjit, Panwar Chand Lal (2012), “A review on security challenges and attacks in wireless sensor networks”, Quoted in international journal of science and research, Volume 3, issue 5.

Khandakar Amith (2012), “Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol”, 4th International Conference on Computer Engineering and Technology (ICCET 2012) IPCSIT vol.40.journal of Communications and Network 6(2): 7-17.

Downloads

Published

2024-03-31

How to Cite

Singh, T., & Chauhan, R. (2024). A COMPREHENSIVE RESEARCH PAPER ON THE IN-DEPTH ANALYSIS OF WI-FI NETWORK SECURITY AND THE IDENTIFICATION OF POTENTIAL THREATS. ShodhKosh: Journal of Visual and Performing Arts, 5(3), 212–224. https://doi.org/10.29121/shodhkosh.v5.i3.2024.1740