Jindal et al., 2012 - Google Patents
Comparative Study On IEEE 802.11 Wireless Local Area Network Securities.Jindal et al., 2012
- Document ID
- 13478968344866852285
- Author
- Jindal K
- Dalal S
- Jaglan V
- Publication year
- Publication venue
- International Journal of Advanced Research in Computer Science
External Links
Snippet
Abstract The IEEE 802.11 Wireless Networks gains its popularity and fame by providing the users with several advantages in accessing information. WLANs provide true mobility and flexibility to users. Another advantage of wireless technology is installation. A physical or …
- 230000000052 comparative effect 0 title description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/14—WLL [Wireless Local Loop]; RLL [Radio Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | A literature review of security threats to wireless networks | |
Kissi et al. | Penetration testing of IEEE 802.11 encryption protocols using Kali Linux hacking tools | |
Alblwi et al. | A survey on wireless security protocol WPA2 | |
Brown | 802.11: the security differences between b and i | |
Jindal et al. | Comparative Study On IEEE 802.11 Wireless Local Area Network Securities. | |
Rana et al. | Common security protocols for wireless networks: A comparative analysis | |
Xing et al. | Security analysis and authentication improvement for ieee 802.11 i specification | |
Sharma et al. | A review on wireless network security | |
Wang et al. | Practical defense against wep and wpa-psk attack for wlan | |
Trimintzios et al. | WiFi and WiMAX secure deployments | |
Pandikumar et al. | Wi-Fi security and test bed implementation for WEP and WPA cracking | |
Chen et al. | Security in wireless local area networks | |
Hasan et al. | Security concerns in WiMAX | |
Adbeib | Comprehensive Study on Wi-Fi Security Protocols by Analyzing WEP, WPA, and WPA2 | |
Zaim | Apakah wpa/wpa2 benar-benar aman? dekripsi paket data terenkripsi pada wpa/wpa2 | |
Mahammad et al. | Key distribution scheme for preventing key reinstallation attack in wireless networks | |
Pervaiz et al. | Security in wireless local area networks | |
Asante et al. | Analysis of security vulnerabilities in wifi-protected access pre-shared key | |
Verma et al. | The Impact of Using Security Issues in Wireless Local Area Networks | |
Mhadjou | Overview of WLAN security Vulnerabilities | |
Sharma et al. | Wireless Network Security: Requirements, Attacks, Vulnerabilities, Security Solutions | |
Jafri et al. | ANonce encryption in 802.11 i 4-way handshake protocol | |
Haque et al. | Threat analysis and guidelines for secure WiFi and WiMAX Network | |
Frankel et al. | Guide to ieee 802.11 i: Establishing robust security networks | |
Vihervuori | Recent Developments in IEEE 802.11 Wireless Local Area Network Link-layer Security |