Heterogeneous scheduling in wireless networks: Machine to machine case study

Author(s):  
Konstantinos A. Lizos
Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


2012 ◽  
Vol 2 (5) ◽  
pp. 112-122 ◽  
Author(s):  
Udora N. Nwawelu ◽  
Anthony N. Nzeako ◽  
Mamilus A. Ahaneku
Keyword(s):  

2008 ◽  
Vol 68 (11) ◽  
pp. 1425-1436 ◽  
Author(s):  
Chung-Kai Chen ◽  
Cheng-Wei Chen ◽  
Chien-Tan Ko ◽  
Jenq-Kuen Lee ◽  
Jyh-Cheng Chen

Sign in / Sign up

Export Citation Format

Share Document