Security analysis of a WLAN network sample in Tunja, Boyacá, Colombia
dc.contributor.author | Monsalve-Pulido, Julián Alberto | spa |
dc.contributor.author | Aponte-Novoa, Fredy Andrés | spa |
dc.contributor.author | Chaparro- Becerra, Fabián | spa |
dc.coverage.campus | CRAI-USTA Bogotá | spa |
dc.date.accessioned | 2019-12-17T16:40:01Z | spa |
dc.date.available | 2019-12-17T16:40:01Z | spa |
dc.date.issued | 2015-01-01 | spa |
dc.description | Éste documento presenta resultados de un análisis de seguridad de redes WLAN en la ciudad de Tunja Boyacá Colombia basado en una muestra aleatoria distribuida en toda la Ciudad. El estudio es resultado de investigación del proyecto “Diagnóstico de seguridad informática aplicado a una muestra de organizaciones de la ciudad de Tunja” financiado por la Universidad Santo Tomás Seccional Tunja. La información recolectada y analizada se obtuvo mediante las técnicas Warchalking y Wardriving en una representación significativa de redes inalámbricas de empresas públicas, privadas, entidades educativas y hogares ubicados geográficamente en diferentes sectores de la ciudad. Como resultado de la investigación se demostró diferentes niveles de riesgo con respecto a configuraciones de tecnología de algunos dispositivos de entidades públicas, privadas y sectores residenciales, por último se realizaron algunas recomendaciones y conclusiones que mejorarán el nivel de seguridad por medio de buenas prácticas a nivel de configuración y uso de estas redes. | spa |
dc.description.abstract | This paper presents results of a safety analysis of WLAN networks in the city of Tunja, Boyacá Colombia, it is based on a random sample distributed in all over the City. The study is a research result of the project "diagnosis of technology security, applied to a sample of organizations in the city of Tunja". It was funded by the University of Santo Tomas Sectional Tunja. The information collected and analyzed was obtained through the techniques warchalking and Wardriving, in a meaningful representation of wireless networks from public, private, educational institutions and households located geographically in different parts of the city. As a result of the research it was demonstrated different risk levels regarding certain technology configurations of devices of the public, private and residential sectors, finally some conclusions and recommendations were made to enhance the level of security through good practice to configurational level and use of these networks. | spa |
dc.description.domain | http://unidadinvestigacion.usta.edu.co | spa |
dc.format.mimetype | application/pdf | spa |
dc.identifier.doi | https://doi.org/10.15446/dyna.v82n189.43259 | spa |
dc.identifier.uri | http://hdl.handle.net/11634/20425 | |
dc.relation.references | Rodrigo, C., Avanzando en la seguridad de las redes Wifi. Enfoques [Online]. 73, pp. 23-32, 2005. [date of reference January 25th of 2014]. Available at: http://www.rediris.es/difusion/publicaciones/boletin/73/ENFOQUE1 .pdf | spa |
dc.relation.references | Ministerio de las Tecnologias de la Información y las Comunicaciones. [en línea]. MinTic, 2010. [consulta, 10 de febrero de 2014]. Available at: http://www.mintic.gov.co/portal/vivedigital/612/w3-propertyvalue- 6106.html | spa |
dc.relation.references | Khetarpal, R. and Dronamraju, S., SMART—A Solution for Managing, the capacity, growth, and performance of wireless networks. IEEE - Bell Labs Technical Journal, pp. 182-193, 1997. | spa |
dc.relation.references | Cama-Pinto, A., Gil-Montoya F., Gómez-López, J., García-Cruz, A. and Manzano-Agugliaro, F., Wireless surveillance sytem for greenhouse crops, DYNA, 81 (184), pp. 164-170, 2014. | spa |
dc.relation.references | Tao, C., Lijun, C. and Tracey, H., Distributed optimization in wieless networks using broadcast advantage. Proceedings of the 46th IEEE Conference on Decision and Control, pp. 5839-5844. 2007. | spa |
dc.relation.references | Sheldon, F.T. and Weber, J.M., Seong-Moo, Y. and Pan, W.D., The insecurity of wireless networks. Security & Privacy, IEEE, 10, pp. 54-61. 2012. | spa |
dc.relation.references | Ballesteros, C.J. y Chaparro, F., Seguridad en redes inalámbricas de acceso local bajo parámetros de uso de herramientas libres. Congreso Internacional de Investigación en Ingeniería de Sistemas,1, pp. 1-6. 2014. | spa |
dc.relation.references | Molina, J.M., Seguridad en redes inalámbricas 802.11. Sistemas & Telemática, 1, pp. 13-28. 2004. | spa |
dc.relation.references | Han, J.A., Lee, J.B., Kwon, T.A., Jo, D.C., Ha, T.D. and Choi, Y.A., How to mitigate signal dragging during wardriving. IEEE Pervasive Computing, 9, pp. 20-27. 2010. | spa |
dc.relation.references | Battiti, R., Cigno, R.L., Sabel, M., Orava, F. and Pehrson, B., Wireless LANs: From warchalking to open access networks. Mobile Networks and Applications, 10, pp. 275-287. 2005. | spa |
dc.relation.references | Jinyoung, H., Jeongkeun, L., Kwon, T,. Daehyung J., Taejoon H. and Yanghee C., How to mitigate signal dragging during wardriving, Pervasive Computing, IEEE, 9 (1), pp. 20-27, 2010. http://doi:10.1109/MPRV.2010.6 | spa |
dc.relation.references | Battiti, R., Lo-Cigno, R., Sabel, M., Orava, F. and Pehrson, B., Wireless LANs: From WarChalking to open access networks, Mobile Networks and Applications, 10 (3), pp. 275-287, 2005. http://doi:10.1007/s11036-005-6422-4 | spa |
dc.relation.references | Khakurel, S., Tiwary, P.K., Maskey, N. and Sachdeva, G., Security vulnerabilities in IEEE 802.11 and adaptive encryption technique for better performance, Industrial Electronics & Applications (ISIEA), 2010 IEEE Symposium on, pp. 207-210, 2010. http://doi:10.1109/ISIEA.2010.5679467 | spa |
dc.relation.references | Bandela-Chaitanya, X.Y., Vulnerabilities and Security Enhancements for the wireless networks. IEEE Globecom 2005 proceedings,1 (1), pp. 1655-1659. 2005. | spa |
dc.relation.references | Lashkari, A., Danesh, M. and Samadi, B., A survey on wireless security protocols (WEP, WPA and WPA2/802.11i), Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on, pp.48-52, 2009. http://doi:10.1109/ICCSIT.2009.5234856 | spa |
dc.relation.references | Reddy, S., Sai, R., Rijutha, K., Ali, S.M. and Reddy, C.P., Wireless hacking - a WiFi hack by cracking WEP, Education Technology and Computer (ICETC), 2010 2nd International Conference on, pp. V1- 189-V1-193, 2010. http://doi:10.1109/ICETC.2010.5529269 | spa |
dc.relation.references | Kavka, O., Garasym, I. and Dudykevych, V., The analyse of wireless communication encryption technologies. Modificated WEP protocol, Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2010 International Conference, pp.186-187, 2010. | spa |
dc.relation.references | Xiaona, L., Shaoqing, M. and Kaining, Lu., Security issues and solutions of WPA encrypted public wireless Local Area Network, Multimedia Technology (ICMT), 2011 International Conference on, pp. 3655-3657, 2011. http://doi:10.1109/ICMT.2011.6002258 | spa |
dc.relation.references | Lei, Z., Jiang, Y., Zugao, D. and Renfei, Z., The security analysis of WPA encryption in wireless network, Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp. 1563-1567, 2012. http://doi:10.1109/CECNet.2012.6202145 | spa |
dc.relation.references | Lashkari, A., Mansoor, M. and Danesh, A., Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA), 2009 International Conference on Signal Processing Systems, pp. 445- 449, 2009. http://doi:10.1109/ICSPS.2009.87 | spa |
dc.rights | Atribución-NoComercial-CompartirIgual 2.5 Colombia | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/2.5/co/ | * |
dc.subject.keyword | Networks | spa |
dc.subject.keyword | Security | spa |
dc.subject.keyword | Warchalking | spa |
dc.subject.keyword | Wardriving | spa |
dc.subject.keyword | Wep | spa |
dc.subject.keyword | Wlan | spa |
dc.subject.keyword | Wpa | spa |
dc.subject.proposal | Redes | spa |
dc.subject.proposal | Seguridad | spa |
dc.subject.proposal | Warchalking | spa |
dc.subject.proposal | Wardriving | spa |
dc.subject.proposal | Wep | spa |
dc.subject.proposal | Wlan | spa |
dc.subject.proposal | Wpa | spa |
dc.title | Security analysis of a WLAN network sample in Tunja, Boyacá, Colombia | spa |
dc.type.category | Generación de Nuevo Conocimiento: Artículos publicados en revistas especializadas - Electrónicos | spa |
Archivos
Bloque original
1 - 1 de 1
Cargando...
- Nombre:
- Security analysis of a WLAN network sample in Tunja, Boyacá, Colombia.pdf
- Tamaño:
- 1 MB
- Formato:
- Adobe Portable Document Format
- Descripción:
- Artículo SCOPUS
Bloque de licencias
1 - 1 de 1

- Nombre:
- license.txt
- Tamaño:
- 807 B
- Formato:
- Item-specific license agreed upon to submission
- Descripción: