AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
listen for any responding probe response frame from node or access points (Clincy &<br />
Sitaram, 2006).<br />
Figure 3.2 Tools used in the Wireless security filed trials<br />
3.6 Data Analysis Considerations<br />
Based on the previous study by Lin et al. in 2004, data analysis in this dissertation will<br />
mainly focus on the operation mode <strong>of</strong> the WLANs detected, the encryption status, and<br />
the service set identifier (SSID).<br />
3.6.1 Operation Mode<br />
WLANs can operate in either ad hoc or infrastructure mode. The data retrieved from<br />
the field trials on the distribution <strong>of</strong> the ad hoc (IBSS) and infrastructure mode (ESS) is<br />
used to determine the preferred architecture <strong>of</strong> the WLANs deployment in Auckland<br />
CBD (Yek & Bolan, 2004).<br />
3.6.2 Encryption Status<br />
If a device is encrypted, the Netstumbler s<strong>of</strong>tware will report it as “WEP” regardless <strong>of</strong><br />
whether the device is really using WEP (Clincy & Sitaram, 2006). Therefore the<br />
analysis will use “Encryption Status” instead <strong>of</strong> “WEP” during data analysis. The data<br />
collected on encryption status will be used to determine the level <strong>of</strong> wireless security<br />
awareness among users in Auckland CBD. WEP is assumed as the most basic security<br />
protocol that should be applied as the first defense against network attackers. The field<br />
trial conducted by Lin et al (2004) is used as a benchmark for this study. If the<br />
25