scispace - formally typeset
Open AccessJournal ArticleDOI

Wireless LAN Security Threats & Vulnerabilities

Md. Waliullah, +1 more
- 01 Jan 2014 - 
- Vol. 5, Iss: 1, pp 176-181
Reads0
Chats0
TLDR
The various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system are discussed and overall guidelines and recommendation are provided to theHome users and organizations.
Abstract
Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

TL;DR: In this paper, the authors present an approach for detecting intrusions in smart spaces such as smarthomes, or smartfactories, that is based on the monitoring and profiling of radio communications at the physical layer using machine learning techniques.
Journal ArticleDOI

Design and verification of a mobile robot based on the integrated model of cyber-Physical systems

TL;DR: The model represents cyber-physical systems as a set of building blocks with properties and connections between them, while each building block is the projection of the integrated model, which provides the formal check of the system creation possibility in accordance with the requirements and limitations.
Journal ArticleDOI

WLAN Security: Threats And Countermeasures

Suroto Suroto
TL;DR: The conclusion that WLAN security is not easy, and it is constantly changing, and all businesses need to determine their security requirements based on the application using the WLAN.
Journal ArticleDOI

Bluetooth Protocol in Internet of Things (IoT), Security Challenges and a Comparison with Wi-Fi Protocol: A Review

TL;DR: An overview of the current state of Bluetooth and Wlan(Wi-fi) technology is given and the security vulnerabilities and undercurrents imposed by the inherent open nature of wireless communications are examined.
Journal ArticleDOI

IPTV service framework based on secure authentication and lightweight content encryption for screen-migration in Cloud computing

TL;DR: A framework of IPTV service based on secure authentication mechanism and light weight content encryption method for screen-migration in Cloud computing is proposed based on cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by.
References
More filters
Proceedings ArticleDOI

Wireless security threat taxonomy

D. Welch, +1 more
TL;DR: This work presents a wireless threat taxonomy that was used to build the security architecture for the wireless network at West Point and shows the different characteristics of wireless networks.
Journal ArticleDOI

Securing Wi-Fi networks

TL;DR: This work assesses Wi-Fi network security in one city, analyzes alternative security techniques, and suggest ways to secure such networks.
Journal ArticleDOI

The Insecurity of Wireless Networks

TL;DR: This article reviews OSSMs and the results of experimental attacks on WPA to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.
Related Papers (5)