Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/124
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rathnakar | - |
dc.contributor.author | Vityanathan | - |
dc.contributor.author | Raj, Pethur | - |
dc.date.accessioned | 2022-04-20T03:42:41Z | - |
dc.date.available | 2022-04-20T03:42:41Z | - |
dc.date.issued | 2009-08 | - |
dc.identifier.issn | 1793-8163 | - |
dc.identifier.uri | http://192.168.20.106:8080/xmlui/handle/123456789/124 | - |
dc.description.abstract | enabling technologies, tools, languages, frameworks and platforms facilitating the much anticipated convergence of Web and wireless communication started to unfold, the vision of ushering mobile / wireless Internet is all set to fructify and blossom here in a big way in the days to come. Fortunately Mobile Internet / Wireless Web is a larger part of the grand vision of ubiquitous Computing (providing information and services on demand in a secure manner for any one at any time, at the desired quantity and quality, at any place through any device). But one critical, urgent and explosive issue that stands out in making computing and communication ubiquitous, pervasive and invisible is security. As security problem has encompassed the whole IT domain today, there is a serious and focused research on bringing out robust, unbreakable, durable and innovative security ideas and solutions. Thus the requirement of security has come to the center stage of research. In this new, highly important and fast emerging field security is being touted as the main obstacle for extensive proliferation of wireless Internet usage. In this paper, we have explained about the wireless Local Area Network (WLAN) security challenges along with how a hacker is able to break into the wireless network like WEP cracking, MAC attack, Man-in-middle attack, Dictionary attack, session hijacking and DoS followed by the existing and proposed viable solutions such as WEP based security using RC4 algorithms and the issues related to the same. | en_US |
dc.publisher | International Journal of Computer and Electrical Engineering, Vol. 1, No. 3, August 2009 | en_US |
dc.subject | IEEE802.11i, RC4 algorithm | en_US |
dc.subject | TKIP, VPN | en_US |
dc.subject | WEP | en_US |
dc.subject | Wi Fi Protected Access | en_US |
dc.subject | Wireless network MAC layer | en_US |
dc.subject | WLAN security | en_US |
dc.title | Wireless LAN Security – Challenges and Solutions | en_US |
dc.type | Article | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Wireless LAN Security.pdf Restricted Access | 424.35 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.