wireless router
Recently Published Documents


TOTAL DOCUMENTS

76
(FIVE YEARS 29)

H-INDEX

3
(FIVE YEARS 0)

SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 147-154
Author(s):  
Deuis Nur Astrida ◽  
Agung Restu Saputra ◽  
Akhmad Ikhza Assaufi

The use of computer networks in an agency aims to facilitate communication and data transfer between devices. The network that can be applied can be using wireless media or LAN cable. At SMP XYZ, most of the computers still use wireless networks. Based on the findings in the field, it was found that there was no user management problem. Therefore, an analysis and audit of the network security system is needed to ensure that the network security system at SMP XYZ is safe and running well. In conducting this analysis, a tool is needed which will be used as a benchmark to determine the security of the wireless network. The tools used are Penetration Testing Execution Standard (PTES) which is one of the tools to become a standard in analyzing or auditing network security systems in a company in this case, namely analyzing and auditing wireless network security systems. After conducting an analysis based on these tools, there are still many security holes in the XYZ wireless SMP that allow outsiders to illegally access and obtain vulnerabilities in terms of WPA2 cracking, DoS, wireless router password cracking, and access point isolation so that it can be said that network security at SMP XYZ is still not safe


2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>


2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>


2021 ◽  
Vol 2087 (1) ◽  
pp. 012049
Author(s):  
Dekai Chen ◽  
Boshui Xue ◽  
Ruofeng Sun

Abstract A kind of substation inspection robot carrying unmanned aerial vehicle(UAV) was studied to solve the problems of complex indoor environment of substation, high intensity of manual inspection and low efficiency of traditional inspection method. Using robot mobile platform connected to the robot controller of ontology, the robot controller of ontology through wireless router and background monitoring system for information transmission and according to the background monitoring system control command control robot mobile platform preset in the transformer substation inspection lines and parking. Walking on the robot mobile platform is equipped with the UAV. Wireless information transmission between the UAV and the robot body controller, take-off and landing controlled by the robot body controller and the camera component on the UAV takes pictures of the equipment and instruments of the substation so as to complete the substation inspection work safely and reliably.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3538
Author(s):  
Krzysztof Stępień ◽  
Aneta Poniszewska-Marańda

Vehicular ad hoc networks (VANETs) are created according to the principles of ad hoc mobile networks (MANETs), i.e., spontaneous creation of a wireless network for vehicle-to-vehicle (V2V) communication. Each vehicle in this network is treated as a node that is part of the mobile network. VANET turns all cooperating vehicles into a wireless router or node. This makes it possible to connect all cars within range to a stationary unit and create a wide network with a huge range. VANET is widely used for better traffic management, vehicle-to-vehicle communication, and road information provision. The VANET network is exposed to identity and information attacks, concealing or delaying data transmission, or information theft. Therefore, there are multiple types of attack, such as Sybil or bogus, that might harm the whole network infrastructure. The consequences of the mentioned two attacks could lead not only to the given infrastructure but could cause hammering people’s lives. In this paper, we analyze the ongoing methods for preserving Sybil and bogus attacks in a VANET network together with the authors’ methods: the Bogus & Sybil Trust Level & Timestamp (B&STL&T) algorithm and the Bogus & Sybil Enhanced Behavior Processing & Footprint (B&SEBP&F) algorithm. The first algorithm, the Bogus & Sybil Trust Level & Timestamp (B&STL&T) algorithm was improved into the Bogus & Sybil Enhanced Behavior Processing & Footprint (B&SEBP&F), presented in the paper. The proposed methods were tested with multiple scenarios using different variations of bogus and Sybil attack and various attacker–victim node number ratios. During analysis, it was observed that detection of all attackers in the network was reduced by approximately 30% in comparison to previous work and that of other cited authors.


Author(s):  
Naseer Ali Hussien ◽  
Alaa Abdulhussein Daleh Al-Magsoosi ◽  
Haider Th. Salim AlRikabi ◽  
Faisal Theyab Abed

<p class="0abstract">One of the instrumental functional overheads in many commercial edifices and industrial plants is the electricity bill. The design and development of a Smart Power monitoring device used to make monitoring on the electrical parameters represented as voltage, current, and power of Wasit university buildings. The system has a unit with smart sensing to detect and control the electrical devices employed for daily activities by following different tariff rates. It has the capability to decrease consumer costs improving grid stability. A developed model was broadly examined and experimental results comparing these results with devices of conventional measuring. The Arduino based wireless powering meter is a non-invasive existing meter for domiciliary power with a WI-FI Connection. A split-core is used to measure the current transformers. 802.11b connection is a means for transmitting data through the home’s wireless router to the base station and monitoring web portal based on wireless sensor network. A clear projection for domestic data use is one of the aims of this project. By these data, it can supply estimation to consuming power. Optimizing and reducing power usage are the objectives of providing such data.</p>


2021 ◽  
Vol 10 (2) ◽  
pp. 1080-1091
Author(s):  
Hussain Falih Mahdi ◽  
Mohammed Salah Abood ◽  
Mustafa Maad Hamdi

VANET is a branch of MANETS, where each vehicle is a node, and a wireless router will run. The vehicles are similar to each other will interact with a wide range of nodes or vehicles and establish a network. VANETs provide us with the infrastructure to build new solutions for improving safety and comfort for drivers and passengers. There are several routing protocols proposed and evaluated for improving VANET's performance. The simulator is preferred over external experience because it is easy, simple, and inexpensive. In this paper, we choose AODV protocol, DSDV protocol, and DSR protocol with five different nodes density. For each protocol, as regards specific parameters like (throughput, packet delivery ratio, and end- to- end delay). On simulators that allow users to build real-time navigation models of simulations using VANET. Tools (SUMO, MOVE, and NS-2) were used for this paper, then graphs were plotted for evaluation using Trace-graph. The results showed the DSR is much higher than AODV and DSDV, In terms of throughput. While DSDV is the best choice because of the low average end to end delay. From the above, we conclude that each strategy has its own negative and positive aspects that make it ideally suited to a particular scenario than other scenarios.


Author(s):  
С. Костючко ◽  
Л. Кирилюк ◽  
Н. Чернящук ◽  
К. Бортник ◽  
С. Гринюк

The article proposes a multi-level algorithm for protecting information transmission by means of a wireless router and Raspberry Pi. The proposed algorithm is implemented on the basis of separate encryption tools operating in parallel with secure communication channels. By directing traffic to anonymous and protected servers (Tor) and by encrypting information and using a DNS proxy in parallel, the information is available only to legitimate users


2021 ◽  
Vol 6 (1) ◽  
pp. 1199-1207
Author(s):  
Muhammad Haqeem bin Mohd Nasir ◽  
Wan Siti Halimatul Munirah binti Wan Ahmad ◽  
Nurul Asyikin binti Mohamed Radzi ◽  
Fairuz Abdullah

Sign in / Sign up

Export Citation Format

Share Document