Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Akomea-Agyin, Kwabena"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Vulnerability analysis in wireless local area networks: a survey of some wireless access points in Ghana.
    (November, 2016 ) Akomea-Agyin, Kwabena
    Wireless Communications can be found everywhere including banks, telecommunication companies, hotels, hospitals, academic institutions, government sectors, intelligence organizations, and the military. If these wireless communications are hacked, huge classified data and information will be lost to un-authorized persons globally. This thesis work focused on Wireless Local Area Networks (WLANs). It examined whether there are vulnerabilities in the IEEE 802.11 security protocols of WLANs. If there are vulnerabilities, it further examined whether the vulnerabilities can be used to hack into a WLAN. The IEEE 802.11 standard specified three types of security protocols for WLANs: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and Wi-Fi Protected Access 2 (WPA-2). Hence, this thesis work focused on discovery vulnerabilities in WEP, WPA, and WPA-2 through experiments. A laboratory consisting of two laptops with wireless cards, a wireless access point, and an authentication server was set up to probe into the security protocols. A software called BackTrack 5 was installed on one of the laptops. The software was used to launch various attacks in an attempt to discover vulnerabilities and to retrieve the secret keys of WEP, WPA, and WPA-2 networks. The expectation of this thesis work is to discover a number of vulnerabilities as possible in the IEEE 802.11 Security Protocols of WLANs. Secondly, it is expected to use these vulnerabilities to successfully hack into WLANs.  

Kwame Nkrumah University of Science and Technology copyright © 2002-2025