Nothing Special   »   [go: up one dir, main page]

Jindal et al., 2012 - Google Patents

Comparative Study On IEEE 802.11 Wireless Local Area Network Securities.

Jindal et al., 2012

Document ID
13478968344866852285
Author
Jindal K
Dalal S
Jaglan V
Publication year
Publication venue
International Journal of Advanced Research in Computer Science

External Links

Snippet

Abstract The IEEE 802.11 Wireless Networks gains its popularity and fame by providing the users with several advantages in accessing information. WLANs provide true mobility and flexibility to users. Another advantage of wireless technology is installation. A physical or …
Continue reading at search.ebscohost.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/14WLL [Wireless Local Loop]; RLL [Radio Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication

Similar Documents

Publication Publication Date Title
Kumar et al. A literature review of security threats to wireless networks
Kissi et al. Penetration testing of IEEE 802.11 encryption protocols using Kali Linux hacking tools
Alblwi et al. A survey on wireless security protocol WPA2
Brown 802.11: the security differences between b and i
Jindal et al. Comparative Study On IEEE 802.11 Wireless Local Area Network Securities.
Rana et al. Common security protocols for wireless networks: A comparative analysis
Xing et al. Security analysis and authentication improvement for ieee 802.11 i specification
Sharma et al. A review on wireless network security
Wang et al. Practical defense against wep and wpa-psk attack for wlan
Trimintzios et al. WiFi and WiMAX secure deployments
Pandikumar et al. Wi-Fi security and test bed implementation for WEP and WPA cracking
Chen et al. Security in wireless local area networks
Hasan et al. Security concerns in WiMAX
Adbeib Comprehensive Study on Wi-Fi Security Protocols by Analyzing WEP, WPA, and WPA2
Zaim Apakah wpa/wpa2 benar-benar aman? dekripsi paket data terenkripsi pada wpa/wpa2
Mahammad et al. Key distribution scheme for preventing key reinstallation attack in wireless networks
Pervaiz et al. Security in wireless local area networks
Asante et al. Analysis of security vulnerabilities in wifi-protected access pre-shared key
Verma et al. The Impact of Using Security Issues in Wireless Local Area Networks
Mhadjou Overview of WLAN security Vulnerabilities
Sharma et al. Wireless Network Security: Requirements, Attacks, Vulnerabilities, Security Solutions
Jafri et al. ANonce encryption in 802.11 i 4-way handshake protocol
Haque et al. Threat analysis and guidelines for secure WiFi and WiMAX Network
Frankel et al. Guide to ieee 802.11 i: Establishing robust security networks
Vihervuori Recent Developments in IEEE 802.11 Wireless Local Area Network Link-layer Security