A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Holistic approach to Wep protocol in securing wireless network infrastructure
2006
Computer Science and Information Systems
The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. ...
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. ...
The basic function of WEP protocol is to make data security in wireless networks in the same way as it is in the wired networks. ...
doi:10.2298/csis0602097p
fatcat:ylqxn35u3vgunfqvcogd56c4ie
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
[article]
2014
arXiv
pre-print
This paper holistically evaluated various enhanced protocols proposed to solve WEP related authentication, confidentiality and integrity problems. ...
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing. ...
An approach for providing an end-to-end wireless security for local area network client/server environment was proposed and implemented in [5] . ...
arXiv:1409.2261v1
fatcat:oxoy63ou7rb5djwgd4sxzcj2wi
A Literature Review of Security Threats to Wireless Networks
2014
International Journal of Future Generation Communication and Networking
As we know wireless networks have broadcast nature so there are different security issues in the wireless communication. ...
In this paper we will mull over the different remote security dangers to wireless systems and conventions at present accessible like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi ...
Holistic view of security in wireless sensor networks is also described. ...
doi:10.14257/ijfgcn.2014.7.4.03
fatcat:aw662nqydffercciyrrip7swxq
Real-time service provisioning for mobile and wireless networks
2006
Computer Communications
Finally, concepts for securing the communication between the users of real-time applications in wireless and mobile networks are presented. ...
Due to the difference between traditional and wireless networks, in particular in terms of available bandwidth and network structure, the concepts used for supporting real-time applications in both networks ...
In wireless ad hoc networks, access to remote key infrastructure systems cannot be guaranteed, which leads to such security problems as delayed certificate revocation lists. ...
doi:10.1016/j.comcom.2005.06.005
fatcat:5oc5ojme55byzjz2bpymls4pvy
The Current Status of Network Security and Forensics –Literature Review
2013
Figshare
Today Networking technology has improved tremendously, going beyond the mainframe model with new concepts such as peer to peer communication, wired and wireless, Internet and IoTs to name just a few. ...
This review investigates broad areas of Network Security and Forensics and their current status. ...
The Wired Equivalent Privacy (WEP) Protocol was designed to provide confidentiality for network traffic (Borisov, Goldberg & Wagner, 2001) . ...
doi:10.6084/m9.figshare.790195.v1
fatcat:rvsjpfpe3zdsvhlhbf72apjxp4
Framework for Wireless Network Security Using Quantum Cryptography
2014
International Journal of Computer Networks & Communications
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys. ...
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. ...
All these ways combined correctly provide a holistic approach to network security for wireless users. ...
doi:10.5121/ijcnc.2014.6604
fatcat:nqskoh757nfw7ptedxzxrcgtoq
Internet As A Application For Secured Data Transmission In Digital World
2016
Zenodo
decisions regarding access to information,whereas issues of security involve the procedures and safeguards for enforcing the privacy decisions . the motivations for security and privacy are found in the ...
Computer security deals with the managerial procedures and technological safeguards applied to computer hardware,software,and data to ensure against accidental or deliberate unauthorized access to computer ...
WEP is a notoriously weak security standard wireless networking is prone to some security issues. ...
doi:10.5281/zenodo.1466307
fatcat:eqel7dflajhcfas2v3dzyd5yey
A Survey on Cyber Security for Smart Grid Communications
2012
IEEE Communications Surveys and Tutorials
To upgrade an existing power grid into a smart grid, it requires significant dependence on intelligent and secure communication infrastructures. ...
However, as many of the communication technologies currently recommended to use by a smart grid is vulnerable in cyber security, it could lead to unreliable system operations, causing unnecessary expenditure ...
No
No
User
Transport
SSH
Yes
Yes
Server
SSL/TLS
Yes
Yes
Network
IPSec
Host-to-Host
Yes
Yes
Host
Link
CHAP/PAP
Point-to-Point
No
No
Client
WEP/WAP/802.1X
Wireless Access ...
doi:10.1109/surv.2012.010912.00035
fatcat:cm4h2vakffg53ndwb4m2q4vbzi
Security Issues in Wireless Sensor Networks
2010
International Journal of Online Engineering (iJOE)
The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. ...
Finally, we will try to provide a general approach to planning and implementing wireless sensor networks to support the arrays of sensors needed to operate plants, conduct scientific experiments, and test ...
Again, ensuring holistic security in wireless sensor network is a major research issue. Many of today's proposed security schemes are based on specific network models. ...
doi:10.3991/ijoe.v6i4.1466
fatcat:nklgp662nbautj3mrw7cuezbru
Information Security Essentials for IT Managers
[chapter]
2013
Computer and Information Security Handbook
Information security involves the protection of organizational assets from the disruption of business operations, modification of sensitive data, or disclosure of proprietary information. ...
Confidentiality The WEP protocol attempts some form of confidentiality by using the RC4 stream cipher algorithm to encrypt wireless communications. ...
Wireless Security Wireless networking enables devices with wireless capabilities to use information resources without being physically connected to a network. ...
doi:10.1016/b978-0-12-394397-2.00021-0
fatcat:xa6v2khugff25bdovj5zbo2z6a
Tracing Your Smart-Home Devices Conversations: A Real World IoT Traffic Data-Set
2020
Sensors
In this paper, the traffic capturing and monitoring mechanism of the GHOST system, called NDFA, is presented, as the first mechanism that is able to monitor smart-home activity in a holistic way. ...
GHOST project aims to fulfill this requirement and one of its main functionalities is the traffic monitoring for all IoT related network protocols. ...
In our work, we follow a holistic approach, where we examine a variety of wireless network protocols, existing in an IoT environment. ...
doi:10.3390/s20226600
pmid:33218082
fatcat:rufcntta3nehdnonqt3ssbfrry
A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
2020
Sensors
In this paper, we run through the design cycle to provide a security-focused approach to the design of IoT systems using a use case, namely, an intelligent solar-panel project called Daedalus. ...
Therefore, there is a need for different approaches in threat assessments to incorporate the interdependencies between different IoT devices. ...
Acknowledgments: Research Assistant, Marcus Lee for development of the security procedures in this work.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s20185252
pmid:32937974
fatcat:6mfmloue75d2fdhbe7c7ihi37e
Operating Mobile Broadband Networks
[chapter]
2011
Self-Organizing Networks
Since the introduction of GSM in the late 1980s, the growth of traffic (and revenue per user) over wireless networks as the first 2G and 3G networks were deployed remained positive and relatively predictable ...
Signal Processing (DSP) capability, multi-media source coding, streaming protocols and low-power high-resolution displays to deliver the so-called smartphone. ...
wireless infrastructures. ...
doi:10.1002/9781119954224.ch1
fatcat:zcuvnir3m5btdhsixyt5mtwljy
5G Security Challenges and Solutions: A Review by OSI Layers
2021
IEEE Access
can design holistic and efficient security protocols for the 5G networks and beyond. ...
Kolias et al. released a study on IEEE 802.11 security protocols. WEP, WPA and WPA2 were studied to identify vulnerabilities relating to 5G networking. ...
doi:10.1109/access.2021.3105396
fatcat:5l26k3voabg4biexp4xjbapzb4
Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures
2021
IoT
, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. ...
as to how to secure these systems. ...
WEP), and Wi-Fi Protected Access II (WPA2) in Wi-Fi and LTE networks [73] . ...
doi:10.3390/iot2010009
fatcat:qf2won2u5zes3gag264k3l7pjq
« Previous
Showing results 1 — 15 out of 64 results