scholarly journals Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)

Author(s):  
B. Indira Reddy ◽  
V. Srikanth

Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.

2018 ◽  
Vol 5 (1) ◽  
pp. 13
Author(s):  
Tri Febriana Handayani ◽  
Pande Ketut Sudiarta ◽  
I Made Oka Widyantara

VoIP is a technology used to communicate voice remotely and directly using data communication lines with TCP / IP protocol. But basically, VoIP communication does not guarantee data security when doing communication. A very important security system is added in VoIP communications to maintain the confidentiality of communication, so that communication can not be recorded and played back. To build a security when communicating VoIP, then in this study added an SRTP-TLS security system. The study was conducted on wireless networks by comparing the security of data communications when using the SRTP-TLS security system and without using a security system.Keywords: Wireless, Security System, VoIP


Author(s):  
Shivankur Thapliyal

Abstract: Computer Networking Play’s a major role for data communication or data sharing and data transmissions from one location to another, which are geographically differ, but in today’s scenario where the main and primary major concerns are not to data transfer but also utilize all resources with greater efficiency and also preserves the confidentiality and integrity of the messages with respect to speed and time with lower Bandwidth and also consume a very low computational costs with low power supply and redirect to optimality. Cloud Computing also play’s a significant role to access data at geographically different locations. So In this paper we create a fusion of Computer Networking Architecture and Cloud Computing Architecture and released a very much superior fundamentally strong Cloud computing based Computer Networking model, which works on the concepts of ‘Virtualization’. Because when the number of hardware components (Servers) drastically increases all factors which are responsible to make possible networking among nodes are also consume each resources at extreme level, and networking becomes complex and slow, that’s why we used the concept of Virtual Machine. In this paper we proposed a Computer Networking model using the concepts of Cloud Computing. This model also suitable for data transmission but also take concern the most significant feature of Computer Networking, which is Data Security. This model also used some Proxy servers/ firewalls to take concern some security mechanisms. In this paper we also proposed Communication Oriented model among the Intercluster domains that how one node which belongs to another CLOUD cluster make possible communication among other InterCLOUD clusters with respect to data security measures. In this paper we proposed three models related to this networking model, which is CLOUD Networking Infrastructure, Connection Oriented model, Communication Oriented model. The detailed description of all three models are in the upcoming sections of this paper. Keywords: Cloud computing based computer networking model, A virtual model for computer networking, Computer Networking model based on virtualization, Virtualization based computer networking model.


2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>


Author(s):  
Carlos F. Lerma ◽  
Armando Vega

Local networks have been, from the beginning, a controversial topic. The organizations that have implemented these types of networks have shown their concern about their levels of security. Ever since the discovery of vulnerabilities among first-generation wireless networks (Borisov, Goldberg, & Wagner, 2001), analysts and security companies have tried to understand and mitigate those risks. Some of those efforts have contributed towards the study of wireless security. Other efforts have failed, presented a different group of vulnerabilities, or require expensive proprietary software and hardware. Finally, other efforts try to mitigate the problem piling up a complex group of security technologies, like virtual private networks. Despite the benefits they bring, a great number of concerns related to security have limited the massive adoption of wireless networks, particularly in sectors that are highly aware of the existing security risks such as the financial and government sectors. Even though there are a significant number of risks inherent to the mass transmission of data to any individual within the boundaries of a wireless network, a good amount of these are installed without any security measure at all. However, the majority of businesses that have implemented some sort of wireless security measures have done so in the most rudimentary way, bringing a false sense of security to users. When the first IEEE 802.11 wireless standards were in the phase of development, security was not as important as it is today. The level of complexity of network threats was much lower and the adoption of wireless technologies was still in an introductory phase. It was under these circumstances that the first standard for wireless network security, known as wired equivalent privacy (WEP), was originated. WEP underestimated the necessary means to turn air security into an element equivalent to the security provided by a cable. In contrast, the security methods of modern wireless networks are designed to work in hostile environments where there is a lack of well-defined physical network perimeters.


2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>


Author(s):  
Manas Kumar Yogi ◽  
◽  
L. Yamuna ◽  
P. Surayanka ◽  
◽  
...  

2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


Sign in / Sign up

Export Citation Format

Share Document