CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Captive Portal System for Reduction of Wireless Networks Security Threats in the Tamale Metropolis

by Sakara S., Alhassan A., Alhassan S.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 5
Year of Publication: 2017
Authors: Sakara S., Alhassan A., Alhassan S.
10.5120/ijca2017915550

Sakara S., Alhassan A., Alhassan S. . A Novel Captive Portal System for Reduction of Wireless Networks Security Threats in the Tamale Metropolis. International Journal of Computer Applications. 176, 5 ( Oct 2017), 23-27. DOI=10.5120/ijca2017915550

@article{ 10.5120/ijca2017915550,
author = { Sakara S., Alhassan A., Alhassan S. },
title = { A Novel Captive Portal System for Reduction of Wireless Networks Security Threats in the Tamale Metropolis },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 5 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number5/28548-2017915550/ },
doi = { 10.5120/ijca2017915550 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:43.417260+05:30
%A Sakara S.
%A Alhassan A.
%A Alhassan S.
%T A Novel Captive Portal System for Reduction of Wireless Networks Security Threats in the Tamale Metropolis
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 5
%P 23-27
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This research work provides an entire overview of Wireless Local Area Network (WLAN), its structure or components and the security threats associated with it. Review of literature and survey of institutions and businesses in the Tamale Metropolis, shows that Wireless Local Area Network is commonly used especially by hospitals, schools, internet cafes and some other private organizations. Its main’s advantage to the society is that a wireless network allows machines to be fully mobile as long as they remain in radio range and also avoids the burden of having cables between the machines. However, Wireless Local Area Networks with these advantages comes with the security threats. The research therefore evaluates the advantages and disadvantages of Wireless Local Area Networks, determine the structure/components of Wireless Local Area Networks and the security threats associated with it. It also revealed that Wireless Local Area Networks must be protected or the security of wireless networks must be enhanced. The research therefore developed a web-based application (a captive portal) to help reduce the security threats associated with Wireless Local Area Network, by preventing intruders or hackers into the system through; capturing user credentials, masquerading as an authorized Access Point by beaconing the WLAN’s service set identifier (SSID) and capturing data to recover a Wired Equivalent Privacy (WEP) key.

References
  1. Kujala, M. (2003, May 28). WLAN standardsand Wireless networking security. Helsinki University of Technology Telecommunications Software and Multimedia Laboratory, 1-9.
  2. NetSol. (2007, June 16). netsolghana.com. Retrieved from NetSol Ghana Web site: hhtp://www.netsolghana.com
  3. Whitepapers. (2008, July 7). Wireless. Retrieved November 18, 2016, from support.usr.com: http://support.usr.com/download/whitepapers/wireless-wp.pdf
  4. Bradley, A. (2016, November 21). thoughtco. Retrieved June 15, 2017, from Why Use PHP?:http://php.about.com/od/phpbasics/p/php_reasons.htm.
  5. Sari, A., & Karay, M. (2015). Impact of Determinants on Student Performance towards Information Communication Technology in Higher Education. International Journal of Learning and Development,, 2, 18-30.
  6. Select Business Solutions. (2014, April 11). selectbs.com/process-maturity/what-is-dsdm. Retrieved June 5, 2017, from selectbs.com: http://www.selectbs.com/process-maturity/what-is-dsdm.
  7. Region, T. G. (2010, December 20). Wireless Networking Security. Retrieved February 24, 2017, from Analysis of "Hole 196" WPA2 Attack: https://airheads.arubanetworks.com/article/arubaanalysis-hole-196-wpa2-attack
  8. Karay, A. S. (2015, December). Comparative Analysis of Wireless Security Protocols: WEP vs WPA . Int. J. Communications, Network and System Sciences,, 8, 483-491.
  9. Kumar, U. A. (2014). A Literature Review of Security Threats to Wireless Networks. International Journal of Future Generation Communication and Networking,, 7, 25-34.
  10. Chhillar, P. A. (2012, September-October). Review of WI-FI Security techniques . International Journal of Modern Engineering Research (IJMER), Vol. 2, Issue. 5,3479-3481.
Index Terms

Computer Science
Information Sciences

Keywords

Bootstrap (JavaScript CSS) Structured query Language (SQL) Hypertext markup language (HTML) Adobe Dreamweaver Personal Home Page (PhP) web-based Proposed system Wireless Local Area Network (WLAN).