Open Access Open Access  Restricted Access Subscription or Fee Access

Security for Wireless Network: A Challenging Task

Ankit Saxena, Swapnesh Taterh

Abstract


We mainly consider the security issue points of Wi-Fi network that how the hacker can hack our Wi-Fi network which can be risky to us. What types of attack are there in the Wi-Fi networks? We also provide some basic idea about the algorithm that is used in encrypting the data for Wi-Fi network. We mainly focus over all these issues and we provide some basic point by which we can easily secure our Wi-Fi network and by these precautions we can be secure from hackers.

Keywords: WLAN, WMAN, wormhole, hacker

Full Text:

PDF

References


Abdel-Karim R., Al T. Security in Wireless Data Networks: A Survey Paper. 2006.

Xiao Y, Frank H.L., Chen H. Handbook of Security and Networks. 2011; 10–2p.

Palihakkara A. Wireless Networks. Primerose Tech Thoughts. 2011 March 14.

Yu B., Xiao B. Detecting selective forwarding attacks in wireless sensor networks. In: Proc. of the 20th International Parallel and Distributed Processing Symposium; Rhodes Island, Greece; 2006. 1218–30p.

Brown J., Jiang X., Du X. Detection of selective forwarding attacks in heterogeneous sensor networks. In ICC. 2008; 1583–7p.

Hai T.H., Huh E.N. Detecting selective forwarding attacks in wireless sensor networks using two-hop neighbour knowledge. In NCA. 2008; 325–31p.

Sun H.M., Chen C.M., Hsiao Y.C. Un-mask: Utilizing neighbour monitoring for attack mitigation in multi-hop wireless sensor networks. 2010; 8: 148–64p.

Zia T., Zomaya A.Y. Security issues in wireless networks. International Conference on Systems and Networks Communications; Oct 29–Nov 3; 2006.

Kalita H.K., Kar A. Wireless Sensor Network Security Analysis. International journal of computer science & information Technology (IJCSIT). 1–10p.

Taterh S., Yadav K.P., Sharma S.K. Security Requirement Elicitation Phase of Secure Software Development Life Cycle. International Journal of Research Review in Engineering, Science and Technology. 2013 March; 2(1).




DOI: https://doi.org/10.37628/ijowns.v1i1.3

Refbacks

  • There are currently no refbacks.