Wireless Network Security Report: Comparing WPA2-PSK and VPN Solutions
VerifiedAdded on 2023/06/03
|9
|1739
|418
Report
AI Summary
This report examines wireless network security, focusing on the vulnerabilities of WPA2-PSK authentication and the benefits of using a VPN for enhanced protection. The introduction defines wireless networks and their reliance on radio transmissions. The discussion section highlights the limitations of WPA2-PSK, detailing how it can be exploited by hackers. It then recommends the adoption of VPN-based security, explaining its technical background and advantages, such as secure connections, data encryption, and access to geo-restricted content. The report emphasizes that a VPN adds an extra layer of security by encrypting data packets, making online activities inaccessible to unauthorized individuals. The conclusion reinforces the benefits of VPNs for secure network operations, suggesting a shift from WPA2-PSK to a VPN-based Wi-Fi security system to mitigate cyber threats. The report is supported by several references related to wireless network security and VPN technologies.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: WIRELESS SECURITY
Wireless Security
Name of the student:
Name of the university:
Author note:
Wireless Security
Name of the student:
Name of the university:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1WIRELESS SECURITY
Abstract
The following report presents a brief idea about the security threats on using a WAP2-PSK
based authentication method in securing Wi-Fi network in an organization. The report
generates the potential threats that might take place while using this authentication-based Wi-
Fi security procedure and based on it the possible recommendation is made for using a VPNN
based Wi-Fi security method. The last part of the report reflects the benefits of using such
method for wireless network security for the organisation.
Abstract
The following report presents a brief idea about the security threats on using a WAP2-PSK
based authentication method in securing Wi-Fi network in an organization. The report
generates the potential threats that might take place while using this authentication-based Wi-
Fi security procedure and based on it the possible recommendation is made for using a VPNN
based Wi-Fi security method. The last part of the report reflects the benefits of using such
method for wireless network security for the organisation.

2WIRELESS SECURITY
Table of Contents
Introduction:...............................................................................................................................3
Discussion:.................................................................................................................................3
Securing wireless network with the help of VPN:.....................................................................4
Conclusion:................................................................................................................................6
References:.................................................................................................................................7
Table of Contents
Introduction:...............................................................................................................................3
Discussion:.................................................................................................................................3
Securing wireless network with the help of VPN:.....................................................................4
Conclusion:................................................................................................................................6
References:.................................................................................................................................7

3WIRELESS SECURITY
Introduction:
Wireless network is defined as a type of computer system that permits computing
strategies to transfer information with individuals without being connected with the help of
any physical medium of communication such as a interacting cable. Modern day wireless
network typically relies upon radio transportations which takes place in the band of
incidences beyond ultraviolet light in the electromagnetic band (Wei et al., 2014). Other
means of wireless gesturing which depend upon higher energy frequencies within the
electromagnetic range are also conceivable. Within the wider network of wireless
transportations, wireless networks are applied at the physical coating (Movassaghi et a.,
2014). Wireless networks are established using wireless access points or WAPs. This report
is prepared to discuss about the ways by which a wireless network can be secured with the
help of some planned security methods.
Discussion:
As far as the wireless network security of the organisation concerns it is recently
using the WPA2-PSK authentication-based method in order to secure its WIFI network
against threats. Now using this WPA2-PSK authentication-based method is not totally
secured in modern days. Many routers nowadays are provided with the WPA2-PSK (AES)
based authentication as a means to secure the Wi-Fi network.
Technical background of the WAP2-PSK based authentication method:
Wired Equivalent privacy or WEP and Wi-Fi protected access or WPA2 are one of
the security algorithms that are used while setting up wireless network. But these oldest
algorithms have been proved to be vulnerable in case of having security flaws. If anyone one
that is the hackers especially who are trying to listen in the conservation through computers
get hold of these security flaw then it will be easier for the hacker to gain information passed
Introduction:
Wireless network is defined as a type of computer system that permits computing
strategies to transfer information with individuals without being connected with the help of
any physical medium of communication such as a interacting cable. Modern day wireless
network typically relies upon radio transportations which takes place in the band of
incidences beyond ultraviolet light in the electromagnetic band (Wei et al., 2014). Other
means of wireless gesturing which depend upon higher energy frequencies within the
electromagnetic range are also conceivable. Within the wider network of wireless
transportations, wireless networks are applied at the physical coating (Movassaghi et a.,
2014). Wireless networks are established using wireless access points or WAPs. This report
is prepared to discuss about the ways by which a wireless network can be secured with the
help of some planned security methods.
Discussion:
As far as the wireless network security of the organisation concerns it is recently
using the WPA2-PSK authentication-based method in order to secure its WIFI network
against threats. Now using this WPA2-PSK authentication-based method is not totally
secured in modern days. Many routers nowadays are provided with the WPA2-PSK (AES)
based authentication as a means to secure the Wi-Fi network.
Technical background of the WAP2-PSK based authentication method:
Wired Equivalent privacy or WEP and Wi-Fi protected access or WPA2 are one of
the security algorithms that are used while setting up wireless network. But these oldest
algorithms have been proved to be vulnerable in case of having security flaws. If anyone one
that is the hackers especially who are trying to listen in the conservation through computers
get hold of these security flaw then it will be easier for the hacker to gain information passed
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4WIRELESS SECURITY
from one computer to the other by simply hacking the wireless network of the system. This
vulnerability can affect consumers all the way to businesses who mostly rely on this WAP2
AES based protection on their Wi-Fi networks.
Advantages of WPA2-PSK based authentication method:
WPA2-PSK method of wireless security resolves the threats that are related to using
the WEP based method. But in spite of this advantage, WPA2-PSK method itself have some
vulnerability features which allows hackers to hack the wireless network easily.
Disadvantages of using WPA2-PSK based authentication method:
According to some reports it was said that the attackers are provided with the ability
to record the authentication process of the WPA2 PSK method from the access point and
actively waits for users to log in to the network in order to steal credentials related to it. This
type of attack is mainly based on the paired master key identifier or the PMKID and the
success of the attack depends on the strength of the pre shared key (Ramesh & Setty, 2014).
The attack may take place to all devices which supports the 802.11i/p/q.r networks with the
enabled roaming function.
Recommendation on WPA2-PSK based authentication method:
So, from the technical background of the WPA2-PSK based authentication method it
is seen that the organisation is at the risk of cyber threat using this WPA2-PSK based
authentication method as the hackers will try to discover the active clients to the AP
connection of the network. As long as the client remains active in the network, the hackers
can kick the consumer off the admittance point with fake de-authentication packages and will
try to hack information that are being passed within the network. So, it is recommended that
the organisation should change their method of wireless network protection method to a more
advanced secure based method.
from one computer to the other by simply hacking the wireless network of the system. This
vulnerability can affect consumers all the way to businesses who mostly rely on this WAP2
AES based protection on their Wi-Fi networks.
Advantages of WPA2-PSK based authentication method:
WPA2-PSK method of wireless security resolves the threats that are related to using
the WEP based method. But in spite of this advantage, WPA2-PSK method itself have some
vulnerability features which allows hackers to hack the wireless network easily.
Disadvantages of using WPA2-PSK based authentication method:
According to some reports it was said that the attackers are provided with the ability
to record the authentication process of the WPA2 PSK method from the access point and
actively waits for users to log in to the network in order to steal credentials related to it. This
type of attack is mainly based on the paired master key identifier or the PMKID and the
success of the attack depends on the strength of the pre shared key (Ramesh & Setty, 2014).
The attack may take place to all devices which supports the 802.11i/p/q.r networks with the
enabled roaming function.
Recommendation on WPA2-PSK based authentication method:
So, from the technical background of the WPA2-PSK based authentication method it
is seen that the organisation is at the risk of cyber threat using this WPA2-PSK based
authentication method as the hackers will try to discover the active clients to the AP
connection of the network. As long as the client remains active in the network, the hackers
can kick the consumer off the admittance point with fake de-authentication packages and will
try to hack information that are being passed within the network. So, it is recommended that
the organisation should change their method of wireless network protection method to a more
advanced secure based method.

5WIRELESS SECURITY
Securing wireless network with the help of VPN:
Technical background of VPN based wireless network security:
VPN or virtual private network is a secure connection between two or more devices
over the internet (Ajah, 2014). The VPN method of Wi-Fi security uses an advanced
encryption protocols and secure tunnelling techniques to encapsulate the data and create a
safe connection to another system over the internet.
Advantages of using VPN:
VPN permits to have the connection of the organisation encoded and secured to
become unidentified online and to keep the circulation data secluded and safe from hackers,
government restriction and other hazards of the internet (Alekseev et al., 2015).
Implementing VPN will also help the users of the organisation to access to congested
contents. Because of geolocation some operational contents such as music files, news,
videos,search engines and so on may be inaccessible from certain countries and places which
needs to be accessed by the organisation for various purpose. Hence using a VPN service lets
the organisation to log in to a server positioned in a residence from where the content is
available. A VPN allows the organisation to connect to a private network and hence
protecting the organisation from latent hackers. The assembly of VPN is considered virtual
because it uses a combination of software controls and tunnelling to create the linking by
means of a hardware such as data cable lines (Perta, et al., 2015). A wireless network once
connected to a VPN, the traffic gets filtered and encrypted keeping all the online activity of
the business completely private. WIFI networks with VPN security are usually used in many
commercial organisations to either allow personnel and other authorised personal to establish
a joining to the company’s server from a distant position or to connect to the organisations
detached private network via wide area network (Ugwoke & Okafor, 2017). Once connected
Securing wireless network with the help of VPN:
Technical background of VPN based wireless network security:
VPN or virtual private network is a secure connection between two or more devices
over the internet (Ajah, 2014). The VPN method of Wi-Fi security uses an advanced
encryption protocols and secure tunnelling techniques to encapsulate the data and create a
safe connection to another system over the internet.
Advantages of using VPN:
VPN permits to have the connection of the organisation encoded and secured to
become unidentified online and to keep the circulation data secluded and safe from hackers,
government restriction and other hazards of the internet (Alekseev et al., 2015).
Implementing VPN will also help the users of the organisation to access to congested
contents. Because of geolocation some operational contents such as music files, news,
videos,search engines and so on may be inaccessible from certain countries and places which
needs to be accessed by the organisation for various purpose. Hence using a VPN service lets
the organisation to log in to a server positioned in a residence from where the content is
available. A VPN allows the organisation to connect to a private network and hence
protecting the organisation from latent hackers. The assembly of VPN is considered virtual
because it uses a combination of software controls and tunnelling to create the linking by
means of a hardware such as data cable lines (Perta, et al., 2015). A wireless network once
connected to a VPN, the traffic gets filtered and encrypted keeping all the online activity of
the business completely private. WIFI networks with VPN security are usually used in many
commercial organisations to either allow personnel and other authorised personal to establish
a joining to the company’s server from a distant position or to connect to the organisations
detached private network via wide area network (Ugwoke & Okafor, 2017). Once connected

6WIRELESS SECURITY
to a VPN the employees of the organisation will receive an internal IP address and thus can
access to anything which when they cannot normally access when plugged in to a private
network (Gierow, 2015).
Recommendation on using a VPN based Wi-Fi security method
With all these vulnerability issues in using the prevailing Wi-Fi security method, it is
therefore suggested to use a Wi-Fi network with a VPN. Implementing this method of Wi-Fi
security adds on an extra layer of security. Using VPN in the organisation will encrypt the
data packets so that everything that is done online in the business process is inaccessible to
anyone who is trying to snoop information on the public network. Thus, for all these reasons
it is recommended to change the prevailing setup of Wi-Fi security of the organisation from
WPA2-PSK based authentication method to a Wi-Fi network with an active VPN.
Conclusion:
Thus, from the above report it can be concluded that it is beneficial for any
organisation to use a VPN based Wi-Fi security in order to operate things via the network in a
secured manner. The WPA2-PSK based authentication method that is used by organisations
though are considered to be secured way for wireless connectivity but according to studies
and reports various security threats has been discovered with this method. So, it is
recommended to use a more secured way to connect with WIFI network and that is allowed
via VPN service. By implementing a VPN in the Wi-Fi security process that risk of getting
to a VPN the employees of the organisation will receive an internal IP address and thus can
access to anything which when they cannot normally access when plugged in to a private
network (Gierow, 2015).
Recommendation on using a VPN based Wi-Fi security method
With all these vulnerability issues in using the prevailing Wi-Fi security method, it is
therefore suggested to use a Wi-Fi network with a VPN. Implementing this method of Wi-Fi
security adds on an extra layer of security. Using VPN in the organisation will encrypt the
data packets so that everything that is done online in the business process is inaccessible to
anyone who is trying to snoop information on the public network. Thus, for all these reasons
it is recommended to change the prevailing setup of Wi-Fi security of the organisation from
WPA2-PSK based authentication method to a Wi-Fi network with an active VPN.
Conclusion:
Thus, from the above report it can be concluded that it is beneficial for any
organisation to use a VPN based Wi-Fi security in order to operate things via the network in a
secured manner. The WPA2-PSK based authentication method that is used by organisations
though are considered to be secured way for wireless connectivity but according to studies
and reports various security threats has been discovered with this method. So, it is
recommended to use a more secured way to connect with WIFI network and that is allowed
via VPN service. By implementing a VPN in the Wi-Fi security process that risk of getting
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7WIRELESS SECURITY
attacked by hackers is much less as it provides additional security layer which encapsulates
the data that are transferred with the network.
attacked by hackers is much less as it provides additional security layer which encapsulates
the data that are transferred with the network.

8WIRELESS SECURITY
References:
Ajah, I. A. (2014). Evaluation of enhanced security solutions in 802.11-based
networks. arXiv preprint arXiv:1409.2261.
Alekseev, I. S., Kuklina, A. I., & Shikhaleva, I. A. (2015). COMPARATIVE ANALYSIS OF
WI-FI SECURITY TECHNOLOGIES. Современные тенденции развития науки и
технологий, (1-2), 144-146.
Gierow, H. J. (2015). Cyber Security in China: Internet Security, Protectionism and
Competitiveness: New Challenges to Western Businesses. Mercator Institute for
China Studies,(22), 1-10.
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless
body area networks: A survey. IEEE Communications surveys & tutorials, 16(3),
1658-1686.
Perta, V. C., Barbera, M. V., Tyson, G., Haddadi, H., & Mei, A. (2015). A glance through the
VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN
clients. Proceedings on Privacy Enhancing Technologies, 2015(1), 77-91.
Ramesh, A., & Setty, S. P. (2014). A Comparative Study on Security Levels in
WLAN. International Journal of Computer Applications, 93(8).
Ugwoke, F. N., & Okafor, K. C. (2017). Cloud-DLT: A Disruptive Cloud based Digital
Library using Lean Design Technique.
Wei, L., Hu, R. Q., Qian, Y., & Wu, G. (2014). Enable device-to-device communications
underlaying cellular networks: challenges and research aspects. IEEE
Communications Magazine, 52(6), 90-96.
References:
Ajah, I. A. (2014). Evaluation of enhanced security solutions in 802.11-based
networks. arXiv preprint arXiv:1409.2261.
Alekseev, I. S., Kuklina, A. I., & Shikhaleva, I. A. (2015). COMPARATIVE ANALYSIS OF
WI-FI SECURITY TECHNOLOGIES. Современные тенденции развития науки и
технологий, (1-2), 144-146.
Gierow, H. J. (2015). Cyber Security in China: Internet Security, Protectionism and
Competitiveness: New Challenges to Western Businesses. Mercator Institute for
China Studies,(22), 1-10.
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., & Jamalipour, A. (2014). Wireless
body area networks: A survey. IEEE Communications surveys & tutorials, 16(3),
1658-1686.
Perta, V. C., Barbera, M. V., Tyson, G., Haddadi, H., & Mei, A. (2015). A glance through the
VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN
clients. Proceedings on Privacy Enhancing Technologies, 2015(1), 77-91.
Ramesh, A., & Setty, S. P. (2014). A Comparative Study on Security Levels in
WLAN. International Journal of Computer Applications, 93(8).
Ugwoke, F. N., & Okafor, K. C. (2017). Cloud-DLT: A Disruptive Cloud based Digital
Library using Lean Design Technique.
Wei, L., Hu, R. Q., Qian, Y., & Wu, G. (2014). Enable device-to-device communications
underlaying cellular networks: challenges and research aspects. IEEE
Communications Magazine, 52(6), 90-96.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.