[PDF][PDF] A literature review of security threats to wireless networks

U Kumar, S Gambhir - International Journal of Future Generation …, 2014 - academia.edu
In the recent years we have huge development of wireless technology. We are presently
getting more subject to wireless technology. As we know wireless networks have broadcast …

Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)

AH Lashkari, M Mansoor… - … Conference on Signal …, 2009 - ieeexplore.ieee.org
Wireless technology has been gaining rapid popularity for some years. Adaptation of a
standard depends on the ease of use and level of security it provides. In this case, contrast …

Analysis and evaluation of wireless networks by implementation of test security keys

A Rahman, M Ali - … in Computing: First International Conference, iCETiC …, 2018 - Springer
There are so many weaknesses found in the Wired Equivalent Privacy (WEP) key usage
protocol and even in the improved Wireless Protected Access (WPA) security key generation …

Design of secure arp on MACsec (802.1 Ae)

JW Lee, SH Park, KH Gum… - 2010 Proceedings of the …, 2010 - ieeexplore.ieee.org
MACsec provides authenticity and integrity for data frame on data link layer by implementing
data encryption. For these advantages, MACsec is highlighted as a solution to protect and …

[PDF][PDF] Improving network performance: an evaluation of TCP/UDP on networks

S Narayan - 2014 - Citeseer
Computer networks are complex-they are a heterogeneous environment in which numerous
services, such as electronic mail, web browsing, voice and multimedia data, traverse the …

[PDF][PDF] Security Threats and Challenges for Wireless Sensor Network

K Vimala, M Jothimani, VT Kiruthika - core.ac.uk
A wireless sensor network is a network of a large number of independently working small
sensing units which can communicate wirelessly. The basic plan of a Wireless sensor …

A Review of Secure Protocols on Wireless Network Technologies

A Sasikala, K Kumaresan - International Journal of communication and …, 2015 - ijccts.org
Abstract Wireless Sensor Networks (WSNs) are used in a various kind of applications in
military, ecological, and health-related areas. Security is consequently important in WSNs …

All-IP 에서SSL-VPN OTP 보안강화인증시스템구현

변병길, 이기영 - 한국정보기술학회논문지, 2011 - dbpia.co.kr
웹 발전에 기반된 기업환경은 가상사설망의 활용과 이에 따른 보안문제를 가져오고 있다. SSL-
VPN 은 별도의 Agent 설치가 필요 없는 웹브라우저 원격접속방법이다. 그러나 대부분 …

[PDF][PDF] A Survey on Wireless Security protocols (WEP, WPA and WPA2)

MA Raza, M Kamran, J Akbar - academia.edu
Wireless technology has been increasingly popular for some year. Acceptance of wireless
network depend on the case of use and level of security. Now day the most of wireless …

[PDF][PDF] Secure Level Transmission in Wi-Fi Using Cryptography

K Prasuna, M Padmaja - academia.edu
Wi-Fi, is a mechanism that allows electronic devices to exchange data wirelessly over a
computer network Wi-Fi suggests Wireless Fidelity, resembling the long-established audio …