Security analysis of a WLAN network sample in Tunja, Boyacá, Colombia

dc.contributor.authorMonsalve-Pulido, Julián Albertospa
dc.contributor.authorAponte-Novoa, Fredy Andrésspa
dc.contributor.authorChaparro- Becerra, Fabiánspa
dc.coverage.campusCRAI-USTA Bogotáspa
dc.date.accessioned2019-12-17T16:40:01Zspa
dc.date.available2019-12-17T16:40:01Zspa
dc.date.issued2015-01-01spa
dc.descriptionÉste documento presenta resultados de un análisis de seguridad de redes WLAN en la ciudad de Tunja Boyacá Colombia basado en una muestra aleatoria distribuida en toda la Ciudad. El estudio es resultado de investigación del proyecto “Diagnóstico de seguridad informática aplicado a una muestra de organizaciones de la ciudad de Tunja” financiado por la Universidad Santo Tomás Seccional Tunja. La información recolectada y analizada se obtuvo mediante las técnicas Warchalking y Wardriving en una representación significativa de redes inalámbricas de empresas públicas, privadas, entidades educativas y hogares ubicados geográficamente en diferentes sectores de la ciudad. Como resultado de la investigación se demostró diferentes niveles de riesgo con respecto a configuraciones de tecnología de algunos dispositivos de entidades públicas, privadas y sectores residenciales, por último se realizaron algunas recomendaciones y conclusiones que mejorarán el nivel de seguridad por medio de buenas prácticas a nivel de configuración y uso de estas redes.spa
dc.description.abstractThis paper presents results of a safety analysis of WLAN networks in the city of Tunja, Boyacá Colombia, it is based on a random sample distributed in all over the City. The study is a research result of the project "diagnosis of technology security, applied to a sample of organizations in the city of Tunja". It was funded by the University of Santo Tomas Sectional Tunja. The information collected and analyzed was obtained through the techniques warchalking and Wardriving, in a meaningful representation of wireless networks from public, private, educational institutions and households located geographically in different parts of the city. As a result of the research it was demonstrated different risk levels regarding certain technology configurations of devices of the public, private and residential sectors, finally some conclusions and recommendations were made to enhance the level of security through good practice to configurational level and use of these networks.spa
dc.description.domainhttp://unidadinvestigacion.usta.edu.cospa
dc.format.mimetypeapplication/pdfspa
dc.identifier.doihttps://doi.org/10.15446/dyna.v82n189.43259spa
dc.identifier.urihttp://hdl.handle.net/11634/20425
dc.relation.referencesRodrigo, C., Avanzando en la seguridad de las redes Wifi. Enfoques [Online]. 73, pp. 23-32, 2005. [date of reference January 25th of 2014]. Available at: http://www.rediris.es/difusion/publicaciones/boletin/73/ENFOQUE1 .pdfspa
dc.relation.referencesMinisterio de las Tecnologias de la Información y las Comunicaciones. [en línea]. MinTic, 2010. [consulta, 10 de febrero de 2014]. Available at: http://www.mintic.gov.co/portal/vivedigital/612/w3-propertyvalue- 6106.htmlspa
dc.relation.referencesKhetarpal, R. and Dronamraju, S., SMART—A Solution for Managing, the capacity, growth, and performance of wireless networks. IEEE - Bell Labs Technical Journal, pp. 182-193, 1997.spa
dc.relation.referencesCama-Pinto, A., Gil-Montoya F., Gómez-López, J., García-Cruz, A. and Manzano-Agugliaro, F., Wireless surveillance sytem for greenhouse crops, DYNA, 81 (184), pp. 164-170, 2014.spa
dc.relation.referencesTao, C., Lijun, C. and Tracey, H., Distributed optimization in wieless networks using broadcast advantage. Proceedings of the 46th IEEE Conference on Decision and Control, pp. 5839-5844. 2007.spa
dc.relation.referencesSheldon, F.T. and Weber, J.M., Seong-Moo, Y. and Pan, W.D., The insecurity of wireless networks. Security & Privacy, IEEE, 10, pp. 54-61. 2012.spa
dc.relation.referencesBallesteros, C.J. y Chaparro, F., Seguridad en redes inalámbricas de acceso local bajo parámetros de uso de herramientas libres. Congreso Internacional de Investigación en Ingeniería de Sistemas,1, pp. 1-6. 2014.spa
dc.relation.referencesMolina, J.M., Seguridad en redes inalámbricas 802.11. Sistemas & Telemática, 1, pp. 13-28. 2004.spa
dc.relation.referencesHan, J.A., Lee, J.B., Kwon, T.A., Jo, D.C., Ha, T.D. and Choi, Y.A., How to mitigate signal dragging during wardriving. IEEE Pervasive Computing, 9, pp. 20-27. 2010.spa
dc.relation.referencesBattiti, R., Cigno, R.L., Sabel, M., Orava, F. and Pehrson, B., Wireless LANs: From warchalking to open access networks. Mobile Networks and Applications, 10, pp. 275-287. 2005.spa
dc.relation.referencesJinyoung, H., Jeongkeun, L., Kwon, T,. Daehyung J., Taejoon H. and Yanghee C., How to mitigate signal dragging during wardriving, Pervasive Computing, IEEE, 9 (1), pp. 20-27, 2010. http://doi:10.1109/MPRV.2010.6spa
dc.relation.referencesBattiti, R., Lo-Cigno, R., Sabel, M., Orava, F. and Pehrson, B., Wireless LANs: From WarChalking to open access networks, Mobile Networks and Applications, 10 (3), pp. 275-287, 2005. http://doi:10.1007/s11036-005-6422-4spa
dc.relation.referencesKhakurel, S., Tiwary, P.K., Maskey, N. and Sachdeva, G., Security vulnerabilities in IEEE 802.11 and adaptive encryption technique for better performance, Industrial Electronics & Applications (ISIEA), 2010 IEEE Symposium on, pp. 207-210, 2010. http://doi:10.1109/ISIEA.2010.5679467spa
dc.relation.referencesBandela-Chaitanya, X.Y., Vulnerabilities and Security Enhancements for the wireless networks. IEEE Globecom 2005 proceedings,1 (1), pp. 1655-1659. 2005.spa
dc.relation.referencesLashkari, A., Danesh, M. and Samadi, B., A survey on wireless security protocols (WEP, WPA and WPA2/802.11i), Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on, pp.48-52, 2009. http://doi:10.1109/ICCSIT.2009.5234856spa
dc.relation.referencesReddy, S., Sai, R., Rijutha, K., Ali, S.M. and Reddy, C.P., Wireless hacking - a WiFi hack by cracking WEP, Education Technology and Computer (ICETC), 2010 2nd International Conference on, pp. V1- 189-V1-193, 2010. http://doi:10.1109/ICETC.2010.5529269spa
dc.relation.referencesKavka, O., Garasym, I. and Dudykevych, V., The analyse of wireless communication encryption technologies. Modificated WEP protocol, Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2010 International Conference, pp.186-187, 2010.spa
dc.relation.referencesXiaona, L., Shaoqing, M. and Kaining, Lu., Security issues and solutions of WPA encrypted public wireless Local Area Network, Multimedia Technology (ICMT), 2011 International Conference on, pp. 3655-3657, 2011. http://doi:10.1109/ICMT.2011.6002258spa
dc.relation.referencesLei, Z., Jiang, Y., Zugao, D. and Renfei, Z., The security analysis of WPA encryption in wireless network, Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp. 1563-1567, 2012. http://doi:10.1109/CECNet.2012.6202145spa
dc.relation.referencesLashkari, A., Mansoor, M. and Danesh, A., Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA), 2009 International Conference on Signal Processing Systems, pp. 445- 449, 2009. http://doi:10.1109/ICSPS.2009.87spa
dc.rightsAtribución-NoComercial-CompartirIgual 2.5 Colombia*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/2.5/co/*
dc.subject.keywordNetworksspa
dc.subject.keywordSecurityspa
dc.subject.keywordWarchalkingspa
dc.subject.keywordWardrivingspa
dc.subject.keywordWepspa
dc.subject.keywordWlanspa
dc.subject.keywordWpaspa
dc.subject.proposalRedesspa
dc.subject.proposalSeguridadspa
dc.subject.proposalWarchalkingspa
dc.subject.proposalWardrivingspa
dc.subject.proposalWepspa
dc.subject.proposalWlanspa
dc.subject.proposalWpaspa
dc.titleSecurity analysis of a WLAN network sample in Tunja, Boyacá, Colombiaspa
dc.type.categoryGeneración de Nuevo Conocimiento: Artículos publicados en revistas especializadas - Electrónicosspa

Archivos

Bloque original

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
Security analysis of a WLAN network sample in Tunja, Boyacá, Colombia.pdf
Tamaño:
1 MB
Formato:
Adobe Portable Document Format
Descripción:
Artículo SCOPUS

Bloque de licencias

Mostrando 1 - 1 de 1
Thumbnail USTA
Nombre:
license.txt
Tamaño:
807 B
Formato:
Item-specific license agreed upon to submission
Descripción: