64 Hits in 5.3 sec

Holistic approach to Wep protocol in securing wireless network infrastructure

Radomir Prodanovic, Dejan Simic
2006 Computer Science and Information Systems  
The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection.  ...  Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms.  ...  The basic function of WEP protocol is to make data security in wireless networks in the same way as it is in the wired networks.  ... 
doi:10.2298/csis0602097p fatcat:ylqxn35u3vgunfqvcogd56c4ie

Evaluation of Enhanced Security Solutions in 802.11-Based Networks [article]

Ifeyinwa Angela Ajah
2014 arXiv   pre-print
This paper holistically evaluated various enhanced protocols proposed to solve WEP related authentication, confidentiality and integrity problems.  ...  Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing.  ...  An approach for providing an end-to-end wireless security for local area network client/server environment was proposed and implemented in [5] .  ... 
arXiv:1409.2261v1 fatcat:oxoy63ou7rb5djwgd4sxzcj2wi

A Literature Review of Security Threats to Wireless Networks

Umesh Kumar, Sapna Gambhir
2014 International Journal of Future Generation Communication and Networking  
As we know wireless networks have broadcast nature so there are different security issues in the wireless communication.  ...  In this paper we will mull over the different remote security dangers to wireless systems and conventions at present accessible like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi  ...  Holistic view of security in wireless sensor networks is also described.  ... 
doi:10.14257/ijfgcn.2014.7.4.03 fatcat:aw662nqydffercciyrrip7swxq

Real-time service provisioning for mobile and wireless networks

K. Farkas, O. Wellnitz, M. Dick, X. Gu, M. Busse, W. Effelsberg, Y. Rebahi, D. Sisalem, D. Grigoras, K. Stefanidis, D.N. Serpanos
2006 Computer Communications  
Finally, concepts for securing the communication between the users of real-time applications in wireless and mobile networks are presented.  ...  Due to the difference between traditional and wireless networks, in particular in terms of available bandwidth and network structure, the concepts used for supporting real-time applications in both networks  ...  In wireless ad hoc networks, access to remote key infrastructure systems cannot be guaranteed, which leads to such security problems as delayed certificate revocation lists.  ... 
doi:10.1016/j.comcom.2005.06.005 fatcat:5oc5ojme55byzjz2bpymls4pvy

The Current Status of Network Security and Forensics –Literature Review

Leutele Grey
2013 Figshare  
Today Networking technology has improved tremendously, going beyond the mainframe model with new concepts such as peer to peer communication, wired and wireless, Internet and IoTs to name just a few.  ...  This review investigates broad areas of Network Security and Forensics and their current status.  ...  The Wired Equivalent Privacy (WEP) Protocol was designed to provide confidentiality for network traffic (Borisov, Goldberg & Wagner, 2001) .  ... 
doi:10.6084/m9.figshare.790195.v1 fatcat:rvsjpfpe3zdsvhlhbf72apjxp4

Framework for Wireless Network Security Using Quantum Cryptography

Priyanka Bhatia, Ronak Sumbaly
2014 International Journal of Computer Networks & Communications  
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.  ...  Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal.  ...  All these ways combined correctly provide a holistic approach to network security for wireless users.  ... 
doi:10.5121/ijcnc.2014.6604 fatcat:nqskoh757nfw7ptedxzxrcgtoq

Internet As A Application For Secured Data Transmission In Digital World

Sanjali S. Doshi
2016 Zenodo  
decisions regarding access to information,whereas issues of security involve the procedures and safeguards for enforcing the privacy decisions . the motivations for security and privacy are found in the  ...  Computer security deals with the managerial procedures and technological safeguards applied to computer hardware,software,and data to ensure against accidental or deliberate unauthorized access to computer  ...  WEP is a notoriously weak security standard wireless networking is prone to some security issues.  ... 
doi:10.5281/zenodo.1466307 fatcat:eqel7dflajhcfas2v3dzyd5yey

A Survey on Cyber Security for Smart Grid Communications

Ye Yan, Yi Qian, Hamid Sharif, David Tipper
2012 IEEE Communications Surveys and Tutorials  
To upgrade an existing power grid into a smart grid, it requires significant dependence on intelligent and secure communication infrastructures.  ...  However, as many of the communication technologies currently recommended to use by a smart grid is vulnerable in cyber security, it could lead to unreliable system operations, causing unnecessary expenditure  ...  No No User Transport SSH Yes Yes Server SSL/TLS Yes Yes Network IPSec Host-to-Host Yes Yes Host Link CHAP/PAP Point-to-Point No No Client WEP/WAP/802.1X Wireless Access  ... 
doi:10.1109/surv.2012.010912.00035 fatcat:cm4h2vakffg53ndwb4m2q4vbzi

Security Issues in Wireless Sensor Networks

Daniel Sora
2010 International Journal of Online Engineering (iJOE)  
The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks.  ...  Finally, we will try to provide a general approach to planning and implementing wireless sensor networks to support the arrays of sensors needed to operate plants, conduct scientific experiments, and test  ...  Again, ensuring holistic security in wireless sensor network is a major research issue. Many of today's proposed security schemes are based on specific network models.  ... 
doi:10.3991/ijoe.v6i4.1466 fatcat:nklgp662nbautj3mrw7cuezbru

Information Security Essentials for IT Managers [chapter]

Albert Caballero
2013 Computer and Information Security Handbook  
Information security involves the protection of organizational assets from the disruption of business operations, modification of sensitive data, or disclosure of proprietary information.  ...  Confidentiality The WEP protocol attempts some form of confidentiality by using the RC4 stream cipher algorithm to encrypt wireless communications.  ...  Wireless Security Wireless networking enables devices with wireless capabilities to use information resources without being physically connected to a network.  ... 
doi:10.1016/b978-0-12-394397-2.00021-0 fatcat:xa6v2khugff25bdovj5zbo2z6a

Tracing Your Smart-Home Devices Conversations: A Real World IoT Traffic Data-Set

Marios Anagnostopoulos, Georgios Spathoulas, Brais Viaño, Javier Augusto-Gonzalez
2020 Sensors  
In this paper, the traffic capturing and monitoring mechanism of the GHOST system, called NDFA, is presented, as the first mechanism that is able to monitor smart-home activity in a holistic way.  ...  GHOST project aims to fulfill this requirement and one of its main functionalities is the traffic monitoring for all IoT related network protocols.  ...  In our work, we follow a holistic approach, where we examine a variety of wireless network protocols, existing in an IoT environment.  ... 
doi:10.3390/s20226600 pmid:33218082 fatcat:rufcntta3nehdnonqt3ssbfrry

A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments

Soodamani Ramalingam, Hock Gan, Gregory Epiphaniou, Emilio Mistretta
2020 Sensors  
In this paper, we run through the design cycle to provide a security-focused approach to the design of IoT systems using a use case, namely, an intelligent solar-panel project called Daedalus.  ...  Therefore, there is a need for different approaches in threat assessments to incorporate the interdependencies between different IoT devices.  ...  Acknowledgments: Research Assistant, Marcus Lee for development of the security procedures in this work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20185252 pmid:32937974 fatcat:6mfmloue75d2fdhbe7c7ihi37e

Operating Mobile Broadband Networks [chapter]

Ken Stewart, Juan Ramiro, Khalid Hamied
2011 Self-Organizing Networks  
Since the introduction of GSM in the late 1980s, the growth of traffic (and revenue per user) over wireless networks as the first 2G and 3G networks were deployed remained positive and relatively predictable  ...  Signal Processing (DSP) capability, multi-media source coding, streaming protocols and low-power high-resolution displays to deliver the so-called smartphone.  ...  wireless infrastructures.  ... 
doi:10.1002/9781119954224.ch1 fatcat:zcuvnir3m5btdhsixyt5mtwljy

5G Security Challenges and Solutions: A Review by OSI Layers

S. Sullivan, A. Brighente, S. Kumar, M. Conti
2021 IEEE Access  
can design holistic and efficient security protocols for the 5G networks and beyond.  ...  Kolias et al. released a study on IEEE 802.11 security protocols. WEP, WPA and WPA2 were studied to identify vulnerabilities relating to 5G networking.  ... 
doi:10.1109/access.2021.3105396 fatcat:5l26k3voabg4biexp4xjbapzb4

Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

Konstantinos Tsiknas, Dimitrios Taketzis, Konstantinos Demertzis, Charalabos Skianis
2021 IoT  
, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption.  ...  as to how to secure these systems.  ...  WEP), and Wi-Fi Protected Access II (WPA2) in Wi-Fi and LTE networks [73] .  ... 
doi:10.3390/iot2010009 fatcat:qf2won2u5zes3gag264k3l7pjq
« Previous Showing results 1 — 15 out of 64 results