Wireless LAN Security Threats & Vulnerabilities
Md. Waliullah,Diane Gan +1 more
Reads0
Chats0
TLDR
The various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system are discussed and overall guidelines and recommendation are provided to theHome users and organizations.Abstract:
Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.read more
Citations
More filters
Proceedings ArticleDOI
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach
TL;DR: In this paper, the authors present an approach for detecting intrusions in smart spaces such as smarthomes, or smartfactories, that is based on the monitoring and profiling of radio communications at the physical layer using machine learning techniques.
Journal ArticleDOI
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems
TL;DR: The model represents cyber-physical systems as a set of building blocks with properties and connections between them, while each building block is the projection of the integrated model, which provides the formal check of the system creation possibility in accordance with the requirements and limitations.
Journal ArticleDOI
WLAN Security: Threats And Countermeasures
TL;DR: The conclusion that WLAN security is not easy, and it is constantly changing, and all businesses need to determine their security requirements based on the application using the WLAN.
Journal ArticleDOI
Bluetooth Protocol in Internet of Things (IoT), Security Challenges and a Comparison with Wi-Fi Protocol: A Review
TL;DR: An overview of the current state of Bluetooth and Wlan(Wi-fi) technology is given and the security vulnerabilities and undercurrents imposed by the inherent open nature of wireless communications are examined.
Journal ArticleDOI
IPTV service framework based on secure authentication and lightweight content encryption for screen-migration in Cloud computing
TL;DR: A framework of IPTV service based on secure authentication mechanism and light weight content encryption method for screen-migration in Cloud computing is proposed based on cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by.
References
More filters
Proceedings ArticleDOI
Wireless security threat taxonomy
D. Welch,S. Lathrop +1 more
TL;DR: This work presents a wireless threat taxonomy that was used to build the security architecture for the wireless network at West Point and shows the different characteristics of wireless networks.
Journal ArticleDOI
Securing Wi-Fi networks
TL;DR: This work assesses Wi-Fi network security in one city, analyzes alternative security techniques, and suggest ways to secure such networks.
Journal ArticleDOI
The Insecurity of Wireless Networks
TL;DR: This article reviews OSSMs and the results of experimental attacks on WPA to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.