09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

listen for any responding probe response frame from node or access points (Clincy &<br />

Sitaram, 2006).<br />

Figure 3.2 Tools used in the Wireless security filed trials<br />

3.6 Data Analysis Considerations<br />

Based on the previous study by Lin et al. in 2004, data analysis in this dissertation will<br />

mainly focus on the operation mode <strong>of</strong> the WLANs detected, the encryption status, and<br />

the service set identifier (SSID).<br />

3.6.1 Operation Mode<br />

WLANs can operate in either ad hoc or infrastructure mode. The data retrieved from<br />

the field trials on the distribution <strong>of</strong> the ad hoc (IBSS) and infrastructure mode (ESS) is<br />

used to determine the preferred architecture <strong>of</strong> the WLANs deployment in Auckland<br />

CBD (Yek & Bolan, 2004).<br />

3.6.2 Encryption Status<br />

If a device is encrypted, the Netstumbler s<strong>of</strong>tware will report it as “WEP” regardless <strong>of</strong><br />

whether the device is really using WEP (Clincy & Sitaram, 2006). Therefore the<br />

analysis will use “Encryption Status” instead <strong>of</strong> “WEP” during data analysis. The data<br />

collected on encryption status will be used to determine the level <strong>of</strong> wireless security<br />

awareness among users in Auckland CBD. WEP is assumed as the most basic security<br />

protocol that should be applied as the first defense against network attackers. The field<br />

trial conducted by Lin et al (2004) is used as a benchmark for this study. If the<br />

25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!