Forming Controlled Zones in Local Wireless Computer Networks

Keywords: controlled access area, wireless computer network, Wi-Fi, LAN, VLAN, WIDS, WPA3, WPA4, jammer

Abstract

The formation of controlled security zones (Controlled Access Area according to CNSSI 4009-2015) in local wireless computer networks based on Wi-Fi technology is investigated. The problem's urgency, caused by the need to protect against unauthorized access, is considered. The methods (physical, software) for forming CPs were analyzed, and the characteristics of these methods and the means of their implementation are highlighted. Special attention has been paid to the analysis of the feasibility of using WPA3 to replace outdated security protocols (WPA, WPA2), as well as its advantages in combating various types of attacks. In the context of technology development, the promising capabilities of the future WPA4 standard, according to the latest IEEE research, were examined. It will strengthen protection mechanisms through artificial intelligence. Also, protocol WPA4 considers potential threats from quantum systems and contains a database of attacks of various types for active countermeasures. The use of a combined method of CTA formation, including physical (directional antennas, jammers) and software (network segmentation using VLAN, implementation of WIDS monitoring), is substantiated. The importance and usefulness of training personnel in the principles of security as a method of protection have been emphasized. The research results have emphasized the need and possibility of implementing these methods when deploying a modern network environment

References

1. Huang B., Yao H., Wu Q. B. Prediction and evaluation of wireless network data transmission security risk based on machine learning. Wireless Networks. 2024.
2. Zhang X. et al. Scalable Power Control/Beamforming in Heterogeneous Wireless Networks with Graph Neural Networks / GLOBECOM 2021 – 2021 IEEE Global Communications Conference, Madrid, Spain, 7–11 December 2021. 2021.
3. Зінченко О. В., Вишнівський В. В., Гладких В. М., Прокопов С. В., Звенігородський О. С. Аналітичне моделювання SDN / NFV. Системи управління, навігації та зв’язку : зб. наук. праць. 2021. Т. 2, № 64. С. 136–139.
4. Zhu C. et al. ADFL: Defending backdoor attacks in federated learning via adversarial distillation. Computers & Security. 2023. Vol. 132. P. 103366.
5. Guri M., Zadov B., Elovici Y. ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields. IEEE Transactions on Information Forensics and Security. 2020. Vol. 15. P. 1190–1203.

Abstract views: 37
PDF Downloads: 37
Published
2025-06-16
How to Cite
Ukhan , Y., & Zhuravska І. (2025). Forming Controlled Zones in Local Wireless Computer Networks. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (59), 241-246. https://doi.org/10.36910/6775-2524-0560-2025-59-30
Section
Computer science and computer engineering