Spelling suggestions: "subject:"wifi"" "subject:"swifi""
91 |
Útok na WiFi síť s využitím ESP32/8266 / WiFi Attacks Using ESP32/8266Stehlík, Richard January 2021 (has links)
The goal of this thesis is an exploration of the possibilities of Espressif's ESP32 chips in combination with Espressif IoT Development Framework with intention of implementing well-known Wi-Fi attacks on this platform. In this work, multiple implementation proposals were done for deauthentication attack in two variants followed by WPA/WPA2 handshake capture, attack on PMKID, creation of rogue MitM access point, or brute-force attack on WPS PIN, and more. A universal penetration tool ESP32 Wi-Fi Penetration Tool was proposed and implemented, including deauthentication attacks with WPA/WPA2 handshake capture. This tool provides an easy way to configure and run malicious Wi-Fi attacks without any domain knowledge required from the user. The outcome of this work opens new attack vectors for the attacker, thanks to cheap, ultra-low powered, and lightweight ESP32 chips.
|
92 |
Video telefon / Video doorphoneHoryna, Miroslav January 2015 (has links)
This thesis deals with door video phone on the platform Raspberry Pi. There is described the platform Raspberry Pi, Raspberry Pi Camera module, operating systems for Raspberry Pi and described installing and configuring the software. Next is described the concept and description of programs created for door video phone and design of additional modules.
|
93 |
Video telefon / Video doorphoneHoryna, Miroslav January 2015 (has links)
This thesis deals with door video phone on the platform Raspberry Pi. There is described the platform Raspberry Pi, Raspberry Pi Camera module, operating systems for Raspberry Pi and described installing and configuring the software. Next is described the concept and description of programs created for door video phone and design of additional modules.
|
94 |
Physical Tracking : menaces, performances et applications. / No English title availableIssoufaly, Taher 28 January 2019 (has links)
La récente émergence des smartphones et des objets connectés a révolutionné le mode de vie des utilisateurs. Ces dispositifs ubiquitaires et équipés de plusieurs interfaces sans fil de communication, sont rapidement devenus indispensables dans la vie quotidienne des utilisateurs avec une utilisation intensive. Les interfaces sans fil de ces objets connectés émettent périodiquement des informations, certaines sont spécifiques aux utilisateurs et permettent par effet de bord d’identifier et de suivre leur déplacements. Le suivi des utilisateurs via les informations fortuitement émises par leurs périphériques sans fil se nomme le Wireless Physical Tracking. Les possibilités offertes par le Wireless Physical Tracking ont suscité un fort intérêt. Plusieurs applications se sont développés et ont permis d’apporter de l’innovation dans plusieurs domaines. Des sociétés de marketing l’utilisent afin de proposer à leurs clients de la publicité ciblée en fonction de leurs parcours dans leur zone d’activité. À une échelle plus grande, les villes intelligentes, ou smart-cities analysent le mouvement des utilisateurs afin d’apporter des services pour le confort des habitants. Enfin, dans le domaine de la recherche, les réseaux Ad-Hoc mobiles et autres DTN nécessitent de s’intéresser à cette pratique car l’étude de la mobilité des utilisateurs représentent un élément clé pour améliorer les performances de ce type de réseau. Cependant, la collecte de ces informations sans le consentement des utilisateurs ou sans qu’elles soient correctement protégées représentent un risque réel pour leur vie privée. C’est autour de ce contexte que s’articule cette thèse divisée en deux parties. La première présente les technologies PAN et WAN, l’état de l’art des méthodes de Wireless Physical Tracking et les contre mesures adoptés. La deuxième partie présentent les contributions de la thèse qui visent à proposer de nouvelles méthodes de suivi, analyser les performances de celles-ci face aux méthodes existantes et dans le cas particulier de l’application de crowd-localisation, à proposer des méthodes de suivi respectueuse de la vie privée. / The recent rise of smart-phones and connected objects has a deep impact its users lifestyle. In 2017, more than a billion and a half smart-phones were sold around the world. These ubiquitous devices, equipped with several wireless communication interfaces, have quickly become essential in the daily life of users with an intensive use. The wireless interfaces of these connected objects periodically transmit information on the network, some of which are user-specific and allow to identify and track their mobility. Tracking users by collecting the information generated by their wireless devices is called Wireless Physical Tracking. The opportunities offered by the Wireless Physical Tracking raised a lot of interest. Several applications have been developed and have brought innovation in several areas. Marketing companies use it to offer to their customers targeted advertising based on their movements in their area of activity. On a larger scale, Smart Cities or smart-cities analyse the movement of users in order to provide services for their inhabitants. Finally, in the field of research in mobile Ad-Hoc networks and DTNs, users mobility is a key element which need to be collected and analysed. However, the collection of this information without the consent of the users or without being properly protected induce a real risk to their privacy. It is around this context that this thesis is focused on. It’s divided into two parts. The first presents the PAN and WAN technologies, the state of the art of Wireless Physical Tracking methods and the adopted counter measures. The second part presents the contributions of the thesis which aims at developing new methods for Physical Tracking and analysing their performances compared to the existing methods. We first present an evaluate BPM, a bluetooth passive monitoring that allows to track the users of Classic Bluetooth device with a detection delay significantly lower than the methods previously used. We then focus on Bluetooth Low Energy and propose the use of a BLEB, a botnet of users tracking BLE objects with their smart-phones. Finally, we also focus on preserving users privacy through the proposal of PPCL, a privacy preserving crowdlocalisation method which allow to track users assets without being trackable.
|
95 |
Secure and Privacy-Preserving Decentralized Wi-Fi Aware Service Discovery Architecture / En Wi-Fi Aware -Decentraliserad säker serviceupptäcktsarkitektur i mobilt ad-hoc-nätverkWang, Jiahao January 2022 (has links)
In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropriate for MANETs or cannot provide security and privacy protection to clients. Service discovery architectures could be either directory-based or directory-less. Both of the two types of architectures suffer from certain security or privacy issues: The directory-based architecture requires a directory server to facilitate communication between service providers and users, which makes the directory server a single point of failure and may harm users’ privacy if the directory server is honestbut- curious; the directory-less architecture solves these two problems but without a trusted directory, the Denial of Service (DoS) attacks can be easily performed on all entities in the system since the mutual authentication between entities consumes significant computational resource. Wi-Fi Aware, a recently introduced Wi-Fi-based connectivity, allows MANETs nodes to discover and connect directly to each other without any infrastructure. Moreover, the size of the message transmitted in this process is large enough (around 255 bytes) for security and privacy protection. So in this thesis, we implemented a Wi-Fi Aware-based decentralized secure service discovery system that allows the clients to directly discover nearby service providers and provide mutual authentication between them without a directory server. In our system we leverage several schemes, including bloom filter, Timed Efficient Stream Loss- Tolerant Authentication (TESLA), and client puzzle. A set of experiments are carried out for the evaluation of the implemented system. The evaluation results show that our system meets most of the security requirements of service discovery architectures with acceptable processing delays. / I moderna moblie ad hoc -nätverk (MANETs) är service discovery en huvudkomponent för noder för att utbyta data och hitta andras tjänster. Men serviceupptäcktsarkitekturerna som utvecklats och antagits av branschen är antingen inte lämpliga i MANET eller kan inte ge kunderna säkerhet och integritetsskydd. service discovery-arkitekturer är katalogbaserade eller kataloglösa. Båda de två arkitekturerna lider av vissa säkerhetseller sekretessproblem: Den katalogbaserade arkitekturen kräver att katalogservern underlättar kommunikationen mellan tjänsteleverantörer och användare, vilket gör katalogservern till en enda felpunkt och kan skada användarnas integritet om katalogservern är ärlig-men-nyfiken; Den kataloglösa arkitekturen löser dessa två problem men utan en pålitlig katalog kan Denial of Service (DoS) -attacker enkelt utföras på alla enheter i systemet eftersom den ömsesidiga autentiseringen mellan enheter förbrukar massor av beräkningsresurser. Nyligen, med den nyaWi-Fi-funktionen som kallas WiFi-Aware cite wifiaware, kan MANET-noder upptäcka och ansluta direkt till varandra utan någon annan typ av anslutning mellan dem . Dessutom är storleken på meddelandet som överförs i denna process tillräckligt stor (cirka 255 byte) för säkerhetsautentisering. Så i denna avhandling implementerade vi ett Wi-Fi Aware-baserat Decentralized Secure service discovery-system som gör att klienterna direkt kan upptäcka närliggande tjänsteleverantörer och tillhandahålla ömsesidig autentisering mellan dem utan en katalogserver. I vårt system används flera system för att skydda vårt system från ovanstående säkerhets- och integritetsfrågor, bland annat blomfilter, Timed Efficient Stream Loss-Tolerant Authentication (TESLA) och klientpussel. En uppsättning utvärderingsförsök utförs för det implementerade systemet. Utvärderingsresultaten visar att vårt system uppfyller de flesta säkerhetskraven för service discovery -arkitekturer med en acceptabel bearbetningsfördröjning.
|
96 |
Energy-efficient enhancements for IEEE 802.11 WLANs : On the way to enable Cellular/Wi-Fi networks interworkingValdenebro González, Fernando January 2014 (has links)
Globally, the number of mobile broadband subscriptions is growing and the amount of mobile data traffic is expected to continue to grow rapidly. In the next five years the number of smartphone subscriptions is expected to more than double, while the amount of mobile traffic per active subscription per month of these subscribers is expected to nearly quadruple. As a consequence, mobile network operators (MNOs) aim to increase radio network capacity and coverage through heterogeneous deployments. In such heterogeneous networks, wireless local area networks (WLANs) are integrated with wireless wide area networks (WWANs), and there exist a tight interaction between them. The almost-ubiquitous support for IEEE802.11 WLANs (usually referred to as Wi-Fi®) makes this radio access technology a potential integrated component of near-future mobile broadband. With Wi-Fi completely integrated into mobile access, MNOs would optimize user experience and use of resources by controlling device’s choice of connectivity. In addition to guaranteeing the best user experience, optimal use of access networks should care about energy-efficiency in order to extend device’s battery life. However, the performance of Wi-Fi is far from meet neither energy-efficiency nor quality of service (QoS) user’s requirements. This radio access technology employs an energy-consuming medium access control (MAC) protocol that wastes both bandwidth and device’s energy resources. Therefore, enhanced MAC protocols, cleverly combined with standardized power saving mechanisms such as automatic power save delivery (APSD), would improve both energy-efficiency and QoS in order to enhance WLANs performance and meet user’s expectations. In addition, current WLAN discovery mechanisms neither meet requirements of the integrated scenario. Handover operations must be improved in terms of energy efficiency and latency. Consequently, enhanced handover schemes should reduce overall device’s energy consumption during the process, and enable seamless handover between Wi-Fi APs and between cellular/Wi-Fi networks. During this thesis project, the main challenges of Wi-Fi towards its integration into mobile access broadband have been analyzed. Consequently, a solution has been designed in order to address the identified challenges, which have been introduced in the previous paragraphs. The solution consists of enhancements for IEEE 802.11 WLANs based on current standards that achieve energy-efficiency and QoS, and facilitate Wi-Fi/cellular networks interworking. Finally, a custom-designed simulator has been used to evaluate the proposed solution. / Globalt sett är antalet mobila bredbandsabonnemang ökar och mängden av mobil datatrafik förväntas fortsätta att växa snabbt. Under de kommande fem åren kommer antalet smartphone-abonnemang väntas mer än fördubblas, medan mängden av mobiltrafiken per aktiv prenumeration per månad för dessa abonnenter väntas nästan fyrdubbla. Som en följd av mobiloperatörer som mål att öka sin radio nätkapacitet och täckning genom heterogena distributioner. I sådana heterogena nätverk, är trådlösa lokala nätverk (WLAN) integrerad med trådlösa WAN-nätverk (WWAN), och det finns en tät interaktion mellan dem. För att möta denna efterfrågan ämnar operatörer av mobila nätverk att öka kapacitet och täckning genom att bygga ut heterogena nätverk. I sådana heterogena nätverk integreras trådlösa lokala nätverk (WLAN) med nätverk med större yttäckning (cellulära nät) med täta interaktioner mellan de olika näten. Det mycket utbredda stödet för IEEE 802.11-standarden (ofta kallad för Wi-Fi®) för WLAN gör denna radioaccessteknik till en potentiell integrerad komponent för mobilt bredband i den nära framtiden. Med Wi-Fi som en integrerad i det mobila accessnätet kan mobilnätsoperatörer optimera användarupplevelsen och resursanvädningen genom att styra de mobila enheternas val av uppkoppling. Förutom att garantera den bästa användarupplevelsen så bör valet av accessnät ta hänsyn till energieffektiviteten för att förlänga batteridrifttiden för den mobila enheten. Wi-Fi är dock långt ifrån att uppfylla användarnas krav på energieffektivitet och tjänstekvalitet, eftersom denna radioaccessteknik använder ett mediumaccessprotokoll (MAC) som varken använder bandbredd eller batterienergi effektivt. Därför kan förbättrade MAC-protokoll kombinerade med standardiserade energibesparingslösningar såsom automatic power save delivery (APSD) ge bättre energieffektivitet och tjänstekvalitet, och därmed förbättra WLANs möjligheter att möta användarnas förväntningar. Dessutom har nuvarande nätverksidentifieringsmekanismer i WLAN svårt att uppfylla kraven i ett scenario med integrerade nätverk, eftersom den nuvarande sökmetoden är långsam och använder mycket energi. En förbättrad lösning bör minska energikonsumtionen under hela processen, och möjliggöra avbrottsfri övergång mellan Wi-Fi accessnoder och mellan cellulära och Wi-Fi-nätverk. Under detta examensarbete har de största utmaningarna för Wi-Fi under integrationen med mobil bredbandsaccess analyserats. En lösning har utvecklats för att lösa de identifierade problemen som beskrivits ovan. Lösningen består av förbättringar av IEEE 802.11 accessnät, som bygger vidare på existerande standardens energieffektivitets- och tjänstekvalitetslösningar och underlättar samverkan mellan Wi-Fi och cellulära nätverk. Slutligen har en egenutvecklad simulator använts för att utvärdera den föreslagna lösningen.
|
97 |
Design and optimization of next-generation carrier-grade wi-fi networks / Conception et optimisation des réseaux wi-fi opérateur de nouvelle générationBen Jemaa, Fatma 27 September 2016 (has links)
Comme le Wi-Fi est devenu de plus en plus important dans les réseaux actuels, ainsi que dans les réseaux du futur, de nouvelles exigences " opérateur " se sont apparues afin de supporter les attentes des utilisateurs et de fournir des réseaux Wi-Fi de haute performance. Dans ce contexte, nous étudions plusieurs problèmes liés à la conception et l'optimisation des réseaux Wi-Fi opérateur de nouvelle génération. Dans la première étape, notre objectif est d'améliorer l'expérience utilisateur Wi-Fi et de lui offrir un accès personnalisé et transparent aux réseaux et services Wi-Fi. Pour cela, nous proposons une extension des trames de gestion IEEE 802.11 pour activer la découverte des services locaux avant l'association Wi-Fi, tout en évitant la surcharge du canal. Nous définissons également un ensemble d'étiquettes de service pour identifier d'une manière standardisée les services les plus connus. Dans la deuxième étape, nous adressons les problèmes liés à l'architecture et la gestion du réseau dans un environnement Wi-Fi opérateur de nouvelle génération. Plus précisément, nous proposons, tout d'abord, une nouvelle architecture Wi-Fi qui exploite les concepts de NFV et du Edge Cloud Computing. Nous visons à travers cette architecture à apporter plus d'agilité et d'adaptabilité et d'améliorer la QoS perçue par l'utilisateur en plaçant des fonctions réseau et certains services à proximité de lui. Pour faire face à certains problèmes de gestion dans cette architecture, nous proposons ensuite des stratégies de placement et de provisionnement des fonctions de réseau virtuelles en s'appuyant sur des exigences de QoS. / As Wi-Fi is gaining a lot of momentum in today’s networks as well as in future networks, new carrier-grade requirements are emerging to support future user expectations and provide high-performance Wi-Fi networks. In this context, we investigate several problems surrounding the design and optimization of carrier-grade next-generation Wi-Fi networks. In the first stage, our objective is to improve the Wi-Fi user experience and offer to him a personalized and seamless access to Wi-Fi networks and services. For this, we propose an extension to the IEEE 802.11 management frames to enable venue service discovery prior to Wi-Fi association while avoiding channel overhead. We define also a set of extensible service labels to uniquely and globally identify the most known venue-based services. In the second stage, we deal with network architecture and management issues in next-generation carrier Wi-Fi environment. More specifically, we first propose a novel carrier-managed Wi-Fi architecture that leverages NFV and Edge Cloud Computing concepts. We aim through this architecture to bring more agility and adaptability and improve user perceived QoS by placing network functions and certain services close to end-users. To address some major management issues in this proposed architecture, we then propose placement and provisioning strategies of Virtual Network Functions based on QoS requirements. These strategies can also be applied to any edge-central wireless carrier architecture, since they do not make any assumption about the underlying wireless technology.
|
98 |
Analysis of radio surveillance in search of missing persons - An empirical study of Bluetooth Low Energy and Wi-Fi characteristicsFredriksson, Mikael January 2022 (has links)
Development of technical and methodological support has been identified as a key area for future research and development within the search and rescue (SAR) of missing persons in Sweden. Previous studies have demonstrated the feasibility of using Wi-Fi signals to locate a missing person, and also developed hardware and software for SAR systems based around Unmanned Aerial Vehicles (UAV). This thesis empirically studies the actual transmission behaviour of three non-connected smartphones over Wi-Fi and Bluetooth Low Energy (BLE), under the assumption that a missing person could be carrying a smartphone with them. Furthermore, the thesis studies the range of relatively low-cost off-the-shelf Wi-Fi and BLE devices in a best-case scenario with free line-of-sight and a slightly elevated transmitter. Finally, the thesis studies how antennas and other factors impact range. The results show that all of the tested smartphones transmit so called Wi-Fi probe packets when Wi-Fi is enabled. Though, these probes are, in most cases, transmitted during short events separated by intervals of 5 to 9 minutes, depending on the smartphone. Furthermore, in most cases only a few packets are transmitted in each event. The interval lengths and scarce packets imply significant limitations to the usability of Wi-Fi in SAR. BLE broadcast transmissions, on the other hand, require that some kind of advertising service is enabled, but are transmitted at least every 10.5 seconds, due to the strict regulation in the Bluetooth standard. This was also demonstrated with the studied iPhone that continuously transmitted BLE packets every two seconds. Roughly 60 % of the smartphones in use in Sweden today are Apple devices, thus a significant portion of all the smartphones in use are likely to be detectable via BLE within brief time intervals. In the tested best-case scenario with free line-of-sight and a slightly elevated transmitter, at least 80 % of the transmitted Wi-Fi probes are detected up to 500-600 meters with a maximum range, with sparsely detected packets, of up to about 700 meters. Correspondingly, at least 80 % of the BLE advertisements are detected up to 60-110 meters with occasional packets detected up to a maximum range of approximately 210 meters. However, the ranges for both Wi-Fi and BLE are highly dependent on the receiving device. In addition to the receiver device and standard, it is found that the transmission power and antenna directivity of the transmitter have a potentially substantial impact on the range with a possible combined difference in directed transmitted power of up to 49 dB. This corresponds to the difference between a strong signal and no detected signal at all. In summary, there are clear differences between the properties of BLE and Wi-Fi, both in terms of range and how different devices transmit broadcast packets (transmission behaviour), resulting in both having advantages and disadvantages in SAR applications. There are also a number of factors on the transmitter and receiver devices that could have considerable impact on the possibility of detecting a device. Concludingly, both BLE and Wi-Fi could fill a role in SAR of missing persons, but both also have major drawbacks that are severely limiting their possible use. / <p>Examensarbetet är utfört vid Institutionen för teknik och naturvetenskap (ITN) vid Tekniska fakulteten, Linköpings universitet</p>
|
99 |
Evaluation, Optimization and Characterization of Miniaturized Triple Band Antennas for Wi-Fi 6 and Wi-Fi 6E / Utvärdering, optimering och karakterisering av miniatyriserade trippelbandsantenner för Wi-Fi 6 och Wi-Fi 6ECheng, Muzi January 2022 (has links)
Antenna is a key component in wireless devices such as cell phones, laptops and smartwatches. With the new generation of Wi-Fi technology: Wi-Fi 6E coming out, 1200MHz bandwidth from 5.925GHz to 7.125GHz is freed for use. Mobile devices are expected to meet the required bandwidth allocated for Wi-Fi 6E. However, electrically small antenna design for Wi-Fi 6 and 6E applications has been a challenge. Reducing the size of antennas while maintaining the performance is one major issue. The goal of this project is to evaluate different antennas and try to find the potential compact antenna that could cover Wi-Fi 6 and Wi-Fi 6E bands. In this project, we evaluated different types of electrically small antennas, explored parameters that affect antenna performance, characterized one nominated antenna in High Frequency Simulation Software(HFSS), prototyped the antenna in Altium Designer and measured the antenna performance using Network Analyzer. The measurement result shows that the proposed antenna is omni-directional, partially meet the fixed frequency requirement and has low efficiency at 2.4GHz but good efficiency at 6GHz bands. The conclusion is that the proposed antenna is good for the extended bandwidth of Wi-Fi 6 but for the whole Wi-Fi 6E the performance still needs to be improved in future work. / Antenn är en nyckelkomponent i trådlösa enheter som mobiltelefoner, bärbara datorer och smartklockor. Med den nya generationens Wi-Fi-teknik: Wi-Fi 6E kommer ut, 1200MHz bandbredd från 5,925GHz till 7,125GHz frigörs för användning. Mobila enheter förväntas uppfylla den erforderliga bandbredden som tilldelats för Wi-Fi 6E. Däremot har en elektrisk liten antenndesign för Wi-Fi 6 och 6E-applikationer varit en utmaning. Att minska storleken på antennerna samtidigt som prestandan bibehålls är en stor fråga. Målet med detta projekt är att utvärdera olika antenner och försöka hitta den potentiella kompakta antennen som kan täcka Wi-Fi 6- och Wi-Fi 6E-banden. I det här projektet utvärderade vi olika typer av elektriskt små antenner, utforskade parametrar som påverkar antennprestanda, karakteriserade en nominerad antenn i High Frequency Simulation Software (HFSS), prototypade antennen i Altium Designer och mätte antennens prestanda med hjälp av Network Analyzer. Mätresultatet visar att den föreslagna antennen är rundstrålande, delvis uppfyller kravet på fast frekvens och har låg verkningsgrad vid 2,4GHz men bra effektivitet vid 6GHz-band. Slutsatsen är att den föreslagna antennen är bra för den utökade bandbredden för Wi-Fi 6 men för hela Wi-Fi 6E behöver prestandan fortfarande förbättras i framtida arbete.
|
100 |
”Learning by doing är bäst av allt egentligen” : Nyare säkerhetsstandarder och kunskapsinhämtninginom trådlösa nätverkMulshine, Tim, Berkemar, Linus January 2023 (has links)
Då data som transporteras över trådlösa nätverk sänds genom luften i form av radiovågor är det viktigt att säkra upp nätverkskommunikationen med nya, erkändasäkerhetsstandarder. Däremot är användningsgraden av nyare säkerhetsstandarder inom Wi-Fi, specifikt WPA3 och PMF, låg. Samtidigt finns ett behov att öka förståelsen för relevanta metoder för kunskapsinhämtning. Syftet med studien är att ge rekommendationer för hur små och medelstora företag kan öka säkerheten i trådlösa nätverk. Studien identifierar orsaker till den låga användningsgraden av nyare säkerhetsstandarder i trådlösa nätverk och även hur nätverksadministratörer håller sig uppdaterade om standarderna. En kvalitativ ansats valdes för att besvara studiens syfte, vilket genomfördes med hjälp av 23 semi-strukturerade intervjuer med nätverksadministratörer i Sverige. Studiens resultat visar på ett tydligt tema där klientbasen i nätverken är huvudanledningen till avvaktandet med att implementera nyare säkerhetsstandarder, där kompabilitet upplevs som ett problem samtidigt som det råder okunskap om standarderna. Bland respondenterna anses metoden praktiskt laborerande vara mest effektiv för kunskapsinhämtning och fortbildning, ofta i samband med läsande av teori för att bilda en grundläggande förståelse. Studien landar i rekommendationer om de nyare säkerhetsstandarderna och kunskapsinhämtning riktade mot nätverksadministratörer, företag och även myndigheter och organisationer som bidrar med riktlinjer om trådlösa nätverk. / As data transmitted over wireless networks is sent through air, in the form of radio waves, it is important to secure network communication with new, recognized security standards. However, the adoption rate of newer security standards in Wi-Fi, specifically WPA3 and PMF, is low. At the same time, there is a need to increase understanding of relevant methods for knowledge acquisition. This study’s purpose is to provide recommendations on how small and medium-sized enterprises can increase the security of wireless networks. The study identifies reasons for the low adoption rate of newer security standards in wireless networks and how network administrators stay updated on the standards. A qualitative approach was chosen to address the study's purpose, which was conducted through 23 semi-structured interviews with network administrators in Sweden. The study's results reveal a clear theme where the client base in the networks is the main reason for reservations to implement newer security standards, with compatibility being perceived as a problem alongside a lack of knowledge about the standards. Among the respondents, practical experimentation is considered the most effective method for knowledge acquisition and continuous education, often combined with reading of theory to form a fundamental understanding. The study concludes with recommendations on the newer security standards and knowledge acquisition targeted towards network administrators, companies, as well as authorities and organizations that provide guidelines on wireless networks.
|
Page generated in 0.04 seconds