dc.creator | Monsalve-Pulido, Julián Alberto | |
dc.creator | Aponte-Novoa, Fredy Andrés | |
dc.creator | Chaparro- Becerra, Fabián | |
dc.date.accessioned | 2019-12-17T16:40:01Z | |
dc.date.accessioned | 2022-09-28T13:54:43Z | |
dc.date.available | 2019-12-17T16:40:01Z | |
dc.date.available | 2022-09-28T13:54:43Z | |
dc.date.created | 2019-12-17T16:40:01Z | |
dc.date.issued | 2015-01-01 | |
dc.identifier | http://hdl.handle.net/11634/20425 | |
dc.identifier | https://doi.org/10.15446/dyna.v82n189.43259 | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/3649070 | |
dc.description.abstract | This paper presents results of a safety analysis of WLAN networks in the city of Tunja, Boyacá Colombia, it is based on a random
sample distributed in all over the City. The study is a research result of the project "diagnosis of technology security, applied to a sample
of organizations in the city of Tunja". It was funded by the University of Santo Tomas Sectional Tunja. The information collected and
analyzed was obtained through the techniques warchalking and Wardriving, in a meaningful representation of wireless networks from
public, private, educational institutions and households located geographically in different parts of the city. As a result of the research it
was demonstrated different risk levels regarding certain technology configurations of devices of the public, private and residential
sectors, finally some conclusions and recommendations were made to enhance the level of security through good practice to
configurational level and use of these networks. | |
dc.relation | Rodrigo, C., Avanzando en la seguridad de las redes Wifi. Enfoques [Online]. 73, pp. 23-32, 2005. [date of reference January 25th of 2014]. Available at: http://www.rediris.es/difusion/publicaciones/boletin/73/ENFOQUE1 .pdf | |
dc.relation | Ministerio de las Tecnologias de la Información y las Comunicaciones. [en línea]. MinTic, 2010. [consulta, 10 de febrero de 2014]. Available at: http://www.mintic.gov.co/portal/vivedigital/612/w3-propertyvalue- 6106.html | |
dc.relation | Khetarpal, R. and Dronamraju, S., SMART—A Solution for Managing, the capacity, growth, and performance of wireless networks. IEEE - Bell Labs Technical Journal, pp. 182-193, 1997. | |
dc.relation | Cama-Pinto, A., Gil-Montoya F., Gómez-López, J., García-Cruz, A. and Manzano-Agugliaro, F., Wireless surveillance sytem for greenhouse crops, DYNA, 81 (184), pp. 164-170, 2014. | |
dc.relation | Tao, C., Lijun, C. and Tracey, H., Distributed optimization in wieless networks using broadcast advantage. Proceedings of the 46th IEEE Conference on Decision and Control, pp. 5839-5844. 2007. | |
dc.relation | Sheldon, F.T. and Weber, J.M., Seong-Moo, Y. and Pan, W.D., The insecurity of wireless networks. Security & Privacy, IEEE, 10, pp. 54-61. 2012. | |
dc.relation | Ballesteros, C.J. y Chaparro, F., Seguridad en redes inalámbricas de acceso local bajo parámetros de uso de herramientas libres. Congreso Internacional de Investigación en Ingeniería de Sistemas,1, pp. 1-6. 2014. | |
dc.relation | Molina, J.M., Seguridad en redes inalámbricas 802.11. Sistemas & Telemática, 1, pp. 13-28. 2004. | |
dc.relation | Han, J.A., Lee, J.B., Kwon, T.A., Jo, D.C., Ha, T.D. and Choi, Y.A., How to mitigate signal dragging during wardriving. IEEE Pervasive Computing, 9, pp. 20-27. 2010. | |
dc.relation | Battiti, R., Cigno, R.L., Sabel, M., Orava, F. and Pehrson, B., Wireless LANs: From warchalking to open access networks. Mobile Networks and Applications, 10, pp. 275-287. 2005. | |
dc.relation | Jinyoung, H., Jeongkeun, L., Kwon, T,. Daehyung J., Taejoon H. and Yanghee C., How to mitigate signal dragging during wardriving, Pervasive Computing, IEEE, 9 (1), pp. 20-27, 2010. http://doi:10.1109/MPRV.2010.6 | |
dc.relation | Battiti, R., Lo-Cigno, R., Sabel, M., Orava, F. and Pehrson, B., Wireless LANs: From WarChalking to open access networks, Mobile Networks and Applications, 10 (3), pp. 275-287, 2005. http://doi:10.1007/s11036-005-6422-4 | |
dc.relation | Khakurel, S., Tiwary, P.K., Maskey, N. and Sachdeva, G., Security vulnerabilities in IEEE 802.11 and adaptive encryption technique for better performance, Industrial Electronics & Applications (ISIEA), 2010 IEEE Symposium on, pp. 207-210, 2010. http://doi:10.1109/ISIEA.2010.5679467 | |
dc.relation | Bandela-Chaitanya, X.Y., Vulnerabilities and Security Enhancements for the wireless networks. IEEE Globecom 2005 proceedings,1 (1), pp. 1655-1659. 2005. | |
dc.relation | Lashkari, A., Danesh, M. and Samadi, B., A survey on wireless security protocols (WEP, WPA and WPA2/802.11i), Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on, pp.48-52, 2009. http://doi:10.1109/ICCSIT.2009.5234856 | |
dc.relation | Reddy, S., Sai, R., Rijutha, K., Ali, S.M. and Reddy, C.P., Wireless hacking - a WiFi hack by cracking WEP, Education Technology and Computer (ICETC), 2010 2nd International Conference on, pp. V1- 189-V1-193, 2010. http://doi:10.1109/ICETC.2010.5529269 | |
dc.relation | Kavka, O., Garasym, I. and Dudykevych, V., The analyse of wireless communication encryption technologies. Modificated WEP protocol, Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2010 International Conference, pp.186-187, 2010. | |
dc.relation | Xiaona, L., Shaoqing, M. and Kaining, Lu., Security issues and solutions of WPA encrypted public wireless Local Area Network, Multimedia Technology (ICMT), 2011 International Conference on, pp. 3655-3657, 2011. http://doi:10.1109/ICMT.2011.6002258 | |
dc.relation | Lei, Z., Jiang, Y., Zugao, D. and Renfei, Z., The security analysis of WPA encryption in wireless network, Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp. 1563-1567, 2012. http://doi:10.1109/CECNet.2012.6202145 | |
dc.relation | Lashkari, A., Mansoor, M. and Danesh, A., Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA), 2009 International Conference on Signal Processing Systems, pp. 445- 449, 2009. http://doi:10.1109/ICSPS.2009.87 | |
dc.rights | http://creativecommons.org/licenses/by-nc-sa/2.5/co/ | |
dc.rights | Atribución-NoComercial-CompartirIgual 2.5 Colombia | |
dc.title | Security analysis of a WLAN network sample in Tunja, Boyacá, Colombia | |
dc.type | Generación de Nuevo Conocimiento: Artículos publicados en revistas especializadas - Electrónicos | |