123
«И
Н
НОВАЦИИ
И
ИНВЕ
СТИ
ЦИИ». № 3. 2022
Wireless networking technology is currently one of the most popular technol-
ogies, but nevertheless, some disadvantages are closely related to wire-
less networks. With wireless network communication, data is transmitted
from one point
to another using radio waves, which makes wireless net-
works vulnerable to attacks. To eliminate threats, understanding these
attacks always provides a good ability to protect the wireless network.
This article will analyze wireless technology with its shortcomings, exist-
ing security and privacy issues, potential threats to the security of a wire-
less network (unauthorized access,
active listening, man-in-the-middle
attack,
denial of service, etc.), tools that hackers often use to exploit vul-
nerabilities in a wireless network (NetStumbler, Kismet, Airsnort,
Airsnarf, Airjack, etc.) and will develop the best
methods for protecting a
wireless network.
Keywords: wireless networks, WPA, WEP, threats, security.
References
1. Welch D. and Lathrop S. (2003). Taxonomy of Wireless Security Threats.
IEEE Workshop on Information Security, 76-83.
2. Yuan, H., Archer, R.L., Xu, J. & Yu, H. (2008). A visualization tool for at-
tacks over a wireless network. Journal of Education, Computer Science
and
Cybernetics, 1.
3. He, K. and Mitchell, J.K. (2005). Security Analysis and Improvements for
IEEE 802.11i. 12th Annual Network and Distributed Systems Security
Symposium (NDSS'05), 90-110.
4. Zyuzin, V. D. Prospects for the development
of the Russian information
society: levels of the digital divide / V. D. Zyuzin, D. V. Vdovenko, O. D.
Kuprikov // Original research. - 2020. - T. 10. - No. 8. - S. 123-129.
5. Fluhrer S., Mantin I. and Shamir A. (2001). Weaknesses in the key sched-
uling algorithm RC4. Computer Science Lecture Notes, 2259/2001, 1-24.
6. Tanenbaum, E. Computer networks / E. Tanenbaum, D. Weatherall. ― St.
Petersburg: Piter, 2012. ― 960 p.
7. Development of an algorithm and software implementation of personal data
protection in cloud storage / A. A. Busenkov, D. I. Bagazhkov, V. V. Cher-
nov [et al.] // Innovations and investments. - 2021. - No. 12. - P. 264-271.
8. Attack on hash functions / V. D. Zyuzin, D. V. Vdovenko, V. N. Bolshakov
[et al.] // EurAsian Journal of BioSciences. - 2020. - Vol. 14. - No 1. - P.
907-913.
9. Zyuzin V.D., Vdovenko D.V., Bolshakov V.N. [et al.] Study of HMAC using
the challenge-response authorization method as an example // Modern
Science: Actual Problems of Theory and Practice. Series: Natural and
technical sciences. - 2020. - No. 4. - P. 81-87. – DOI 10.37882/2223-
2966.2020.04.17.
10. Ivanova, O. V. Assessment of the quality of information security in Russia
in the context of the digitalization of the economy / O. V. Ivanova, V. D.
Zyuzin, A. V. Obukhov // Telecommunication
and computer systems
2020: Proceedings of the international scientific and technical confer-
ence , Moscow, December 14–17, 2020 / Moscow Technical University
of Communications and Informatics. - Moscow: Scientific and technical
publishing house "Hot Line-Telecom", 2020. - P. 395-400.
11. Zyuzin, V. D. Cloud technologies from a business point of view / V. D.
Zyuzin, A. A. Busenkov, S. I. Platonov // Scientific electronic journal Me-
ridian. - 2020. - No. 5 (39). - S. 30-32.
12. Zyuzin, V. D. Technologies in modern marketing / V. D. Zyuzin, R. A.
Kolesnikov, N. S. Kostina // Scientific electronic journal Meridian. - 2020.
- No. 11(45). - S. 66-68.
13. Kukhta, A. I. Analysis of Wi-fi wireless network protection methods / A. I.
Kukhta // Young researcher of the Don. - 2020. - No. 2 (23). - S. 41-48.
14. 8. Evil twin // wikipedia: [website]. ― URL : https://ru.wikipe-
dia.org/wiki/Evil Twin/(Accessed: 11/17/2019).