• Ronrico Slack (student), Georgia College
  • Bryan Marshall, Georgia College


Currently wireless networks are virtually everywhere and though security is easily configurable some people opt to leave their wireless networks unsecured. There are many blogs and columns available online as to what security measure is the best to implement and when, however very few articles actually compare and contrast methods side by side. In this paper we hope to accomplish just by researching the pros and cons of each method and proposing which method should be implemented depending on the situation. Based on your needs the victor from comparison was WPA2 Enterprise, hence we built a RADIUS server and attempted to integrate it into this newly secured network. We then utilized a Microsoft Windows 7 laptop to attempt to connect to the network. Then finally we tested each security measure’s effect on performance due to the different methods of encryption. We found that RADIUS servers are somewhat complex to setup and integrate with WPA2 Enterprise, hence we propose the use of WPA2 Personal with AES encryption; the second most secure method that does not hamper performance and is relatively simple to configure and implement. Therefore, this research lends itself to verifying what was found on the blog sites and columns as to which method offers the best security while remaining simple to set up.

Keywords: Wireless, Security, College Campus, Comparison


APA Citation: Slack, R. & Marshall, B. (2012). A comparison of wireless security procedures: Security coupled with ease of implementation for college campus. Issues in Information Systems, 13(1), 209-214.

Categorized in:

Tagged in:

, ,