Thursday 11 June 2015

Weakness Analysis of Security on Wireless Networks


Weakness Analysis of Security on Wireless Networks

Aji Supriyanto 
Fakultas Teknologi Informasi, Universitas Stikubank Semarang 
e-mail : ajisup@gmail.com 


The use of wireless devices based on the technology is now so much, either
used for voice and data communications. Because wireless technology utilizes frequency
high to deliver a communication, the security vulnerability is also higher
compared with other communication technologies. Various security measures can be carried out
through a communication device used by the user or by the operator who provides services
communications. Weakness wireless networks can generally be divided into two types, namely weakness

on the configuration and weakness on the type of encryption used. Broadly speaking, the gap in
wireless network spread over four layers in which the fourth layer (layer) is actually
is a process of communication datapada wireless media. The fourth layer is a layer
physical, network layer, lapisuser, and layered security aplikasi.Model-handling model that terjadipada
each layer in the wireless technology can be done for example by way of
SSID hiding, utilizing key WEP, WPA-PSK or WPA2-PSK, the implementation of facility
MAC filtering, captive portal infrastructure installation.

Jurnal Teknologi Informasi DINAMIK Volume XI,No. 1, Januari 2006 : 38-46
ISSN : 0854-9524