A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="http://www.sersc.org/journals/IJFGCN/vol7_no4/3.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
A Literature Review of Security Threats to Wireless Networks
<span title="2014-08-31">2014</span>
<i title="Science and Engineering Research Support Society">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/aoxdam2x3rcszlweqkjkp7qcyy" style="color: black;">International Journal of Future Generation Communication and Networking</a>
</i>
In the recent years we have huge development of wireless technology. We are presently getting more subject to wireless technology. As we know wireless networks have broadcast nature so there are different security issues in the wireless communication. The security conventions intended for the wired systems can't be extrapolated to wireless systems. Hackers and intruders can make utilization of the loopholes of the wireless communication. In this paper we will mull over the different remote
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijfgcn.2014.7.4.03">doi:10.14257/ijfgcn.2014.7.4.03</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/aw662nqydffercciyrrip7swxq">fatcat:aw662nqydffercciyrrip7swxq</a>
</span>
more »
... ity dangers to wireless systems and conventions at present accessible like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2). WPA2 is more hearty security convention as compared with WPA on the grounds that it utilizes the Advanced Encryption Standard (AES) encryption. There are few issues in WPA2 like it is helpless against brute force attack and MIC bits could be utilized by programmer to compare it with the decoded content. So in this paper we will concentrate on different sorts of wireless security dangers.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808093449/http://www.sersc.org/journals/IJFGCN/vol7_no4/3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/d6/d3/d6d38d67fe04407a58d4f3354d5fc23c86e69d31.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijfgcn.2014.7.4.03">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
Publisher / doi.org
</button>
</a>