• 39.1% do not change the router’s settings
after resetting the router
• 11.8% reported low bandwidth, because
someone else was maliciously sharing their
Wi-Fi internet connection.
9 SUGGESTIONS
Although, when one uses all the security measures
and the perquisites a wireless network is practically
impenetrable. Those basic measures are:
WPA protocol should be used, WPA-2 is
preferable,
The network secret (passphrase) has to be
changed frequently,
The passphrase should not exist in a dictionary
and it should be at least 20 characters long. As
an extra security measure the passphrase
should contain some symbols (like @#$%^&)
or/and some capital letters,
MAC Address Security & filtering should be
used only as a complimentary and an extra
security measure. If used as a standalone
security measure is useless as it can be
penetrated in seconds with not much of an
effort.
10 CONCLUSIONS
Although we do have today the means to secure a
wireless network, only a very small percentage (8%)
of the Wi-Fi implementations today, are using a
strong cryptographic security (WPA). Combined
with the availability of the attacking tools for
Windows Operating Systems, makes the possibility
of such a network to be compromised, almost a
certainty.
The 92% of the wireless networks implemented
today, are not using any serious security, although
the wireless security nowadays is reliable. The vast
majority of wireless networks today (54%) are using
obsolete methods like WEP to secure the transmitted
data, setting at risk the transmitted information.
REFERENCES
Aircrack-ng. (2007). Retrieved from http://www.aircrack-
ng.org/doku.php
Aircrack-ng. (2007). Is my card compatible with airodump
/aireplay ? Retrieved from aircrack documentation:
http://www.wirelessdefence.org/ Contents/Aircrack
ORIGINAL.html#q080
Airomap. (2007). Retrieved 01 29, 2008, from
http://www.divideconcept.net/index.php?page=airosuit
e/index.php
Andrew Vladimirov, K. V. (2006). Wi-Foo: The Secrets of
Wireless Hacking .
AskOxford. (2008). Retrieved 02 23, 2008, from Oxford
Online Dictionary: http://www.askoxford. om/
results/?view=dict&freesearch=dimitris&branch=1384
2570&textsearchtype=exact
Aslam, B. I. (2006). 802.11 Disassociation DoS Attack
and Its Solutions: A Survey. Mobile Computing and
Wireless Communication International Conference,
2006. Amman: Nat. Univ. of Sci. & Technol.
Bauer, F. L. (2002). Decrypted Secrets. Springler.
Brad, A. (2008). 802.11 Attacks. Retrieved 04 16, 2008,
from Foundstone Professional Services: http://
www.foundstone.com/us/resources/whitepapers/802.1
1%20Attacks.pdf
Cygwin. (2007). Retrieved from http://www.cygwin.com/
Ethereal. (2007). Retrieved 11 17, 2007, from http://
www.ethereal.com/
Geier, J. (2003, May 1). Tutorials. Retrieved 01 2008,
from Wi-Fi Planet: http://www.wi-fiplanet.com/
tutorials/article.php/2200071
Gorlani, M. (2008). Mac Makeup. Retrieved from http://
www.gorlani.com/publicprj/macmakeup/macmakeup.asp
(2004). Analysis and Countermeasure on Vulnerability of
WPA Key Exchange Mechanism. In Y. S. Kang, & e.
al, Information Networking (pp. 915-924). Berlin:
Springer Berlin / Heidelberg.
Kershaw, M. (2007). Kismetwirless. Retrieved from
Kismet: http://www.kismetwireless.net/
Lisa Phifer, Core Competence Inc. (2004, 11 17). Using
WPA without enterprise AAA.
Microsoft. (2008). What are the different wireless network
security methods? Retrieved 01 2008, from Windows
Help and How-to: http://windowshelp.microsoft.
com/Windows/en-US/Help/b385cc8a-af25-489e-a82e-
decf6df26b681033.mspx#EZB
Netstumbler. (2008). Retrieved from http://
www.netstumbler.com/
Ohrtman, F., & Roeder, K. (2007). Wi-Fi Handbook.
McGraw-Hill.
PISA & WTIA. (2005, April). Wireless LAN War Driving
Survey 2004-05. Retrieved 03 2008, from http://
www.hkwtia.org/wtia/WLAN%20War%20Driving%2
0Report%20(2004-5).pdf
Pocket Warrior. (2003). Retrieved 2008, from http://
pocketwarrior.sourceforge.net/
The Shmoo Workgroup. (2008). Retrieved from
http://airsnort.shmoo.com/
Wi-Fi Alliance. (2003, Febrouary 6). Retrieved 01 16,
2008, from Enterprise Solutions for Wireless LAN
Security: http://www.securitytechnet.com/resource/
hot-topic/wlan/Whitepaper_Wi-Fi_Enterprise2-6-03.pdf
SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification
Survey of Wi-Fi Networks in Thessaloniki
101