This document discusses security vulnerabilities in Wi-Fi networks and methods to detect and prevent attacks. It first provides background on Wi-Fi technology and standards. It then examines common Wi-Fi threats like data interception, denial of service attacks, and rogue access points. The document outlines how to set up a secure Wi-Fi network and detect intruders. It also discusses related work around wireless security attacks and vulnerabilities in protocols like WEP, WPA, and WPA2. Specific attacks covered include man-in-the-middle attacks, ARP poisoning, and "Hole 196". The document concludes by describing the implementation of a man-in-the-middle attack on a wireless network.
A Literature Survey on Security Management Policies used in Wireless Domainijtsrd
Wireless is a term used to describe telecommunications in which electromagnetic waves rather than some form of wire carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing these are also sometimes classified as wireless. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. Nowadays wireless networks are the most popular way of communication. For example, internet services in companies, cafes, e markets and in homes. This paper will highlight the drawbacks and their proposed system to give continuous growth of new technologies in wireless domain, both for application and basic research. Papers should emphasize original results relating to the theory and or applications of wireless communications and networking. K. Senthil Kumar | P. Supraja | V. Sridharshini ""A Literature Survey on Security Management Policies used in Wireless Domain"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22854.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/22854/a-literature-survey-on-security-management-policies-used-in-wireless-domain/k-senthil-kumar
Attacks and Risks in Wireless Network Securityijtsrd
Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18625.pdf
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
This paper is mainly based on providing security to the wireless networks through which devices like
Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The
protocols that are required to provide security to wireless networks can be implemented by creating a
wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the
security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be
designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of
the data that is being exchanged. Data should be ensured as and then there will be a perfect
implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to
NS2 and implementation of that protocol by providing a wireless scenario.
A Literature Survey on Security Management Policies used in Wireless Domainijtsrd
Wireless is a term used to describe telecommunications in which electromagnetic waves rather than some form of wire carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing these are also sometimes classified as wireless. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. Nowadays wireless networks are the most popular way of communication. For example, internet services in companies, cafes, e markets and in homes. This paper will highlight the drawbacks and their proposed system to give continuous growth of new technologies in wireless domain, both for application and basic research. Papers should emphasize original results relating to the theory and or applications of wireless communications and networking. K. Senthil Kumar | P. Supraja | V. Sridharshini ""A Literature Survey on Security Management Policies used in Wireless Domain"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22854.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/22854/a-literature-survey-on-security-management-policies-used-in-wireless-domain/k-senthil-kumar
Attacks and Risks in Wireless Network Securityijtsrd
Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18625.pdf
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
This paper is mainly based on providing security to the wireless networks through which devices like
Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The
protocols that are required to provide security to wireless networks can be implemented by creating a
wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the
security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be
designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of
the data that is being exchanged. Data should be ensured as and then there will be a perfect
implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to
NS2 and implementation of that protocol by providing a wireless scenario.
an overview of wireless local area networks and security systemIJAEMSJORNAL
Wireless Communication is one of the fastest growing technologies in the world which is an application of technology and science in the modern life. Radio and telephone to current devices such as mobile phone, laptops, television broadcasting are the most essential part of our life. Wireless LAN, Cellular Telephony and Satellite based communication networks are the several parts of the wireless communication industry. In this paper, we have emphasized on a study of Wireless LAN technologies and its concerned issues: Wireless Networking, What WLANs are, History of WLAN, Need of WLAN, Types of WLAN, Advantages of WLAN, IEEE 802.11 Standards, Network Security.
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
Bluetooth vs Wi-Fi comparison for IoT SolutionsRiyaz Lakhani
While making technology decisions for the internet of things, many a time, the question arises, that should we not use the existing wi-fi infrastructure of IoT projects?
Given below is a list of differences that will give you a holistic perspective on what technology to choose and why. We have built this based on the criteria of reliability, range, data rate, costs of operation and future of the technology to help with building a TCO (Total Cost of Ownership)
an overview of wireless local area networks and security systemIJAEMSJORNAL
Wireless Communication is one of the fastest growing technologies in the world which is an application of technology and science in the modern life. Radio and telephone to current devices such as mobile phone, laptops, television broadcasting are the most essential part of our life. Wireless LAN, Cellular Telephony and Satellite based communication networks are the several parts of the wireless communication industry. In this paper, we have emphasized on a study of Wireless LAN technologies and its concerned issues: Wireless Networking, What WLANs are, History of WLAN, Need of WLAN, Types of WLAN, Advantages of WLAN, IEEE 802.11 Standards, Network Security.
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
Bluetooth vs Wi-Fi comparison for IoT SolutionsRiyaz Lakhani
While making technology decisions for the internet of things, many a time, the question arises, that should we not use the existing wi-fi infrastructure of IoT projects?
Given below is a list of differences that will give you a holistic perspective on what technology to choose and why. We have built this based on the criteria of reliability, range, data rate, costs of operation and future of the technology to help with building a TCO (Total Cost of Ownership)
What are the challenges of providing plain language legal information in various media (print, Web, videos, etc.)? Find out how one non-profit organization - Éducaloi - handles these challenges.
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
The introduction of Wi-Fi has created a plethora of chances for thieves.
Wireless security is the deterrence of unauthorized users from accessing and stealing data from your wireless network. To be more specific, wireless security protects a Wi-Fi network from unwanted access.
Only a minor flaw in your home Wi-Fi network can provide criminal access to nearly all devices that use that Wi-Fi. Access might cause issues with bank accounts, credit card information, kid safety, and a variety of other concerns.
Within this article are pertinent recommendations to assist you in protecting your home Wi-Fi network from illegal access.
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IJNSA Journal
This paper is mainly based on providing security to the wireless networks through which devices like Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating a wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of the data that is being exchanged. Data should be ensured as and then there will be a perfect implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to NS2 and implementation of that protocol by providing a wireless scenario.
1
Table of Contents
Wireless Network Security3
Introduction3
Overview of Wireless Technologies4
Standards of Wireless Specification:6
Security Features6
Wireless Threats7
Wireless Networks Attacks8
Conclusion9
References10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologies
The wireless technologies make the gadgets to have communication without any connection physically, implying that they do not need peripheral or network cabling. The wireless range from the complicated environments, for instance mobile networks that includes 3G mobile phones and local area networks, to less complicated gadgets such as microphones without wire, earphones and other gadgets which will not save or process data and usually used for small range procedures like infrared or communications via Bluetooth (BT) (Egners, Herrmann & Meyer,2015).
Typical IP network wireless devices or infrastructure
Access points or base stations
· Station wireless
· Router wireless
Retransmission devices (Sun, Yan, Zhang & Rong, 2015).
· Repeater wireless
· Network bridge wireless
End points
· Cards or adapters wireless
· Laptops
· PDAs
· Mobile telephones
Infrared devices, such as cordless computer keyboards, remote controls and mice all needs a direct line of sight between the receiver and transmitter to complete the link. Even though the infrared communication replaced by BT technology in most of the gadgets, some legacy standard gadgets still use IR for short range communication (Illiano, & Lupu, 2015).
Network classification of wireless networks
Wireless networks act as date transmitter mechanism between other wireless communications and the traditional wired networks. Wireless network can be structured in different ways but they are frequently categorized into 4 main categories based on their coverage range.
· Wireless wide area network (WWAN)
Which invol ...
Lecture presented by Chito N. Angeles at PAARL's Conference on the theme "The Power of Convergence: Technology and Connectivity in the 21st Century Library and Information Services" held on Nov. 11-13, 2009 at St Paul College, Pasig City
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdropping becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper presents an approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE 802.11g WLAN.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Ichci13 submission 104 (1)
1. WI-FI INFRASTRUCTURE SECURITY
SYSTEM FROM VULNERABLE ATTACKS
Pramodh Kumar.R1
, Dinto Davi.T2
, Saravanakumar.S.N3
Department of computer science and engineering
PPG Institute of Technology,Coimbatore
Affilated to Anna university, Chennai
Abstract - Wi-Fi is a very popular wireless technology
which is powerful core for the global digital infrastructure.
A device connected using Wi-Fi can access the network
resource such as the Internet via a wireless network access
point. Recent discoveries and initiatives highlight a simple
fact that the core is just as vulnerable as the edge. Wi-Fi
can be less secure than wired connections because an
intruder does not need a physical connection. Though
security threats are imminent due to the open nature of
communication, there are certain ways to protect the
infrastructure of a network. In this paper, we examine the
vulnerabilities of Wi-Fi network and this includes the
intrusion detection in the security architecture of that
network. We have shown such mechanism to solve arrival
of intruders by Man-in –the-middle attack on a Wi-Fi
network. Also, provide the steps to eliminate hackers from
the Wi-Fi network and descriptions regarding the
operations performed by different tools to avoid attackers
from network. There are several holes in the wireless
environment through which the attacks enter the network.
In future those holes may be blocked completely by
eliminating hackers from all attacks through which
they enter. We also discuss a number of available
solutions for controlling those threats.
Keywords - Wireless network, Wi-Fi infrastructure,
Security threats, Vulnerability in Wi-Fi and MITM.
1 INTRODUCTION
The present world is in the need of compatible and
portable products in all environments. As in our case the
wired network system was left incompatible and towards
the wireless environment by present users .while advant-
ages over the wireless environment increases the vulnerab-
ilities also increases. All computer users, from the
most casual Internet surfers to large enterprises, could
be af- fected by network security breaches. However,
security breaches can often be easily prevented. This
paper provides a general overview of the most common
network security threats and the steps to protect the
network from threats and ensure that the data traveling
across the net-
works is safe. The attackers enter through the weak holes
present in the wireless environment and make the disturb-
ance to the environment and to the authorized users. We
can prevent it by following some methodologies to avoid
the attackers and restricting them.
1.1 Wireless environment
Wireless Networks have become ubiquitous in
today's world. The interesting and compatible features of
the wireless devices make the users to consume it for the
communication. Millions of people use them
worldwide every day at their homes, offices, and public
hotspots to log on to the Internet and do both personal and
profession - al work. People from government sectors and
private sec- tors tend to use the wireless products for the
communica- tion. Though it offers the communication over
the distance
120ft, the wireless communication is achieved through ac-
cess point and ad-hoc hosts. Access point sends and re-
ceives the wireless signals to the client pc. Ad-hoc
hosts
are also act as the access points.
1.2 Wi-Fi technology:
Wi-Fi is the over the air network used by millions of com
- puters across the world to connect up to each other and
the internet. There are three terms which makes Wi-Fi
work- ing in portable devices.
1.2.1 Radio Signals: Radio Signals are the keys to make
Wi-Fi environment. Wi-Fi antennas transmit these signals
which are picked up by Wi-Fi receivers such as computers
and cell phones that are equipped with Wi-Fi cards. When
a computer receives any of these signals within the range
of a Wi-Fi network, will read the signals and thus create an
internet connection between the user and the network. Ac-
cess points which consist of antennas and routers are the
main source to transmit and receive radio waves.
1.2.2 Wi-Fi Cards: Wi-Fi card acts as an invisible
cord that connects your computer to the Wi-Fi antenna for
a dir- ect connection to the internet. These cards can be
external
2. or internal. If Wi-Fi card is not installed in a computer, can
attach a purchased USB antenna externally connect to
your USB port or have an Wi-Fi antenna-equipped expan-
sion card installed directly to that computer.
1.2.3 Wi-Fi Hotspots: A Wi-Fi hotspot can be created by
installing an access point to an internet connection. Wire-
less signals are transmitted from the access point over a
short distance of around 300 feet. Every Wi-Fi enabled
devices can then connect to that network wirelessly. Few
Hotspots require WEP key to connect to be private or se-
cure. As it is an open connections, any device with a Wi-Fi
card can gain access to that hotspot.
1.3 Wi-Fi standards:
The 802.11 standard is declared through several
specifications of Wireless network. It defines an over-the-
air interface between a wireless client and a base station or
between two wireless clients.
There are several specifications in the 802.11 family:
802.11: This pertains to wireless LANs and
provides 1- or 2-Mbps transmission in the 2.4-
GHz band using either frequency-hopping spread
spectrum (FHSS) or direct-sequence spread spec-
trum (DSSS).
802.11a: This is an extension to 802.11 that per-
tains to wireless LANs and goes as fast as
54
Mbps in the 5-GHz band. 802.11a employs the
orthogonal frequency division multiplexing
(OFDM) encoding scheme as opposed to either
FHSS or DSSS.
802.11b: The 802.11 high rate Wi-Fi is an exten-
sion to 802.11 that pertains to wireless LANs and
yields a connection as fast as 11 Mbps transmis-
sion (with a fallback to 5.5, 2, and 1 Mbps de-
pending on strength of signal) in the 2.4-GHz
band. The 802.11b specification uses only DSSS.
Note that 802.11b was actually an amendment to
the original 802.11 standard added in 1999 to
per- mit wireless functionality to be
analogous to hard-wired Ethernet connections.
802.11g: This pertains to wireless LANs and
provides 20+ Mbps in the 2.4-GHz band.
2 DESIGN AND SPECIFICATION
Wi-Fi network is introduced to make use of the
most of scarce resources, are sometimes seen as unneces-
sary in the inexpensive WAPs, where wireless seems
so economical. Survey should still perform to determine
the optimal locations for WAPs to minimize channel
interfer- ence while maximizing the range.
2.1 Setting a Wi-Fi Network:
Setting up a Wi-Fi network will allow the com-
puters to get internet connection without plugging in an
Ethernet cable. The user can also share any type of files
from one computer to the other computers wirelessly and
make it easy to stream music and video to any device on
the network. Even some old PCs that don't have wireless
card, there is an alternative that most Wi-Fi routers have a
few Ethernet ports as well.
Before get start to build the network, builder
must have a wireless router, some wireless network
interface cards, if it is built in then don’t for that user’s
computers.
Once user has a router the next step is to choose a
good location. Install router in a central location so that
every room in that place is covered by the Wi-Fi signal.
Here are 5 Steps to connect a Wi-Fi network in a domain
i) Ready the Wi-Fi enabled devices.
ii) Turning it on
iii) Set up the network
iv) Turn on encryption
v) Connect and access the network
Person who identify a best technique to access the
confidential information in any network are hackers. It
does not mean that the internet is not the safest media to
share the information from hackers. Though intruders in-
trude the network it is impossible to attain the process
completely. Safety measure in the place is very important
that to minimize the risk of identified theft in a corporate
network. Recent crime in online media is increase of re-
gistered intrusion activities in corporate network which is
a serious issue in both government private organizations
and also the individuals who are connected together in a
network.
2.2 Detection of intruders:
Person who identify a best technique to access the
confidential information in any network are hackers. It
does not mean that the inter net is not the safest media to
share the information from hackers. Though intruders in-
trude the network it is impossible to attain the process
completely. Safety measure in the place is very important
that to minimize the risk of identified theft in a corporate
network. Recent crime in online media is increase of re-
gistered intrusion activities in corporate network which is
a serious issue in both government private organizations
and also the individuals who are connected together in a
network.
2.3 Restriction from future attacks:
Hackers are mischievous to the network holders;
they find a particular network and perform attack on that
network without printing their footprints. Those attacks
may be more dangerous to the network, due to lack in
identifying the intruders who attacks the network.
Provides more security features to the authenticated users
3. of that particular user and also provide the alternative tech-
nique to avoid the attack by which the intruders enter the
network. The intruders are identified by their IP and MAC
address they used.
3 RELATED WORKS
3.1 Wi-Fi threats:
In Wi-Fi there is high possibility of threats, where
it is the main source of danger. 802.11n products have ma-
tured to the point where many enterprises are
investing huge for faster WLANs to support mission-
critical applic- ations. Here, we offer our Top Ten Wi-Fi
Threats and ex- plain why diligence is required.
Data Interception
Denial of Service
Rogue Aps
Wireless Intruders
Misconfigured Aps
Ad Hocs and Soft Aps
Misbehaving Clients
Endpoint Attacks
Evil Twin Aps
Wireless Phishing
Hackers perform attacks to threaten the users in the net-
work. The threats are only the fact of danger that will
be induced the components or the users through sensible
at- tacks.
3.2 Wireless Security Attacks and
Vulnerabilities:
3.2.1 Encryption-Based Attacks
To make secure the wireless network the encryption of
data is used. Based on the 802.11 protocol, first encryption
technique Wired Equivalent Privacy (WEP) was intro-
duced. It marks protecting the integrity of data being sent
over the network. Later WEP was superseded by Wi-Fi
Protected Access (WPA) which was developed by the Wi-
Fi Alliance to temporary replace the WEP standard as a
more secure alternative. WPA features were intended to
protect the network from WEP attacks.
3.2.2 WEP Attacks
This algorithm is mainly concentrate on the IEEE
802.11 wireless network. It is widely in use and is often
the first security choice presented to users by router
configuration tools.
3.2.2.1 FMS Attack
The first attack on the WEP protocol was called the FMS
attack which was named after Fluhrer, Martin, and Shamir
who published an article describing the weakness in
2001.The FMS attack takes advantage of correlations
between the WEP IVs and the key stream produced by the
RC4 cipher to break the WEP key byte by byte.
3.2.2.2 Korek Attack
Another famous attack was developed by an internet user
posting under the name of KoreK. KoreK released a crack-
ing suite on an internet forum which implemented 17
dif- ferent attacks. While some of these attacks were
previ- ously discovered, most were found by KoreK.
The first group is similar to the FMS attack using the
first word of output from the RC4 algorithm to recover the
key.
3.2.2.3 PTW Attack
The newest and most powerful attack on WEP is called the
PTW attack which is named after its creators Pyshkin,
Tews, and Weinmann and released in 2012. The PTW is
much more powerful than all the other attacks because it
can make use of every packet captured.
3.2.3 WPA Attacks
3.2.3.1 Chop-Chop Attack
The TKIP is countered by the Chopchop attack and not by
key recovery attack. Attacker decrypts the last m bytes of
plaintext of an encrypted packet by sending m*128 pack-
ets to the network in average. It relies on the weakness of
the CRC32 checksum called the ICV which is appended to
the data of the packet. If this attack is successes then at-
tacker can decrypt a WEP data packet without knowing the
key. This can even work against dynamic WEP. This
not recovers the WEP key itself, but reveals the
plaintext. Some access points are not vulnerable to the
attack. Some may seem vulnerable at first but they drop
data packets shorter than 60 bytes. If access point drops
packets shorter than 42 bytes, then tries to guess the rest
of the missing data, where the headers are predictable. If
an IP packet is captured, it checks that the checksum of the
header is cor- rect after guessing the missing parts of it.
This requires at least one WEP data packet.
4. 3.2.4 WPA2 Attacks
WPA2 is introduced with a new interoperability testing
certification from the Wi-Fi Alliance. It is most secure
form of encryption used on wireless networks with Robust
Security Network (RSN) mechanism supports all of the
mechanisms available in WPA. It contains advanced fea-
tures of all other protocols.
The resultant features are explained in the below graph
note in Firure1.
Figure1: Security graph
3.3 Other attack:
3.3.1 Man In The Middle Attacks
A man-in-the-middle attack can succeed only
when the attacker can impersonate each side endpoint to
the satisfaction of the other users. This is the attack on mu-
tual authentication. Majority of cryptographic protocols in-
clude some form of endpoint authentication specifically to
prevent MITM attacks. SSL can authenticate one or both
parties using a mutually trusted certification authority.
This attack intercepts a communication between two wire-
less devices. In http transaction the target is the TCP con -
nection is between client and server. The attacker
splits connection into 2 links, one between the client-the
attacker and the other between the attackers- the server,
as shown in figure2. Once TCP connection is intercepted,
the attack- er acts as a proxy which is able to read, insert
and modify the data in the
communication.
Figure2: Attackers- The Server- The Client
Table 1: Risk table
RISK SHEET
PROTOCOL MITM RISKS
EAP-MD5 On public Ethernets or wireless
LANs, station identities and
password hashes can be easily
sniffed. EAP-MD5 does not provide
mutual authentication or EAP server
authentication. Thus, MITM
attackers may disguise as access
points to deceive legal users into
authenticating to the rouge AP.
EAP-TTLS The systems protected by EAP-
TTLS are still vulnerable to MITM
attacks because user passwords can
be more easily guessed, shared, or
disclosed via social engineering than
client-side certificates.
LEAP The systems protected by LEAP are
still vulnerable to MITM attacks.
PEAP The systems protected by PEAP are
still vulnerable to MITM attacks.
Key Fobs and
One Time
Password
(OTP) tokens
Token-based and smart-card-based
OTP systems are vulnerable to
MITM attacks. Attackers may hijack
online sessions by deceiving legal
users into providing one-time-PINs
produced by tokens or smart cards.
Risk Level: MEDIUM
SSL Credentials can sometimes be stolen
in a MITM attack using a proxy
server.
Risk Level: LOW
3.3.2 ARP Poisoning Attacks
Address Resolution Protocol (ARP) poisoning is most
common attack that is used to set up a Man in the Middle
attack in other network. It is accomplished in two ways,
spoofing ARP replies and sending spoofed IP packets.
ARP is used to find the MAC address of the host with a
specified IP address. If ARP table entry for the default
gateway on the client is received by an attacker, then all
packets the client tries to send out of the network which
will first reach the attacker. A man in the middle attack
along the lines of SSL strip can now be carried out. In or-
der to access the network the network key has been
cracked by this method.
3.3.3 The Hole 196 Attack
These attackers found "Hole196" vulnerability in
WPA2 security protocol exposing WPA2-secured Wi-Fi
networks to insider attacks of IEEE 802.11. Airtight Net-
works uncovers the weakness in WPA2 protocol, which
has been documented.
5. 4 IMPLEMENTATION
4.1 Attack implementation
Implementation of man in the middle attack
involves the following attacking mechanisms which let the
victim to fall in the attackers net.
4.1.1 Learning about the wireless environment
Basically the attacker tend to know about the
features and working of wireless environment .
After getting some essential information such as
• Access point working standard
• Manufacture info
• Signal strength
• WPS protection status
• Security status
• Encryption status
• IP address range
• Packet filtering status
That information collected from the environment will help
the attacker to implement the attack with preferred tools
and techniques .Then the attacker tries to hack the
encryption key.
4.1.2 Password recovery Attack
There are possibilities of recovering the WPA key
in case of weak nature of password. (figure3)
Step1: attacker should capture the packets enough to find
the password.
Step2: continue the capturing till getting valid handshakes
Step3: run the recovery tool aircrack-ng
Figure 3: Password recovery attack using Aircrack-ng
4.1.3 Entering into WLAN – Replacing idle IP
Step1: scanning the IP status in the wireless network.
Step2: if idle IP found, attacker is lucky to implement
further spoofing process.
4.1.4 ARP spoofing
Step1: to active the IP forwarding in the attackers’
pc.
Step 2: perform ARP spoofing (Linux /windows) Linux
is preferred. (figure 4).
Figure 4: ARP spoofing using Backtrack 5
4.1.5 Damaging the victim’s process
Step1: altering the packets
Step2: victim gets damaged packets
4.2 Security implementation
Attackers enter the secured area through identifying its
weakness.so authority should block the holes where the
attacker enters.
4.2.1 Checking IP MAC address mapping
Step1: to monitor the ARP cache
Step2: periodically checking IP-mac mapping with arp
cache identifies arp poisoning
Step3: identify the foot prints of attacker and restricting
from future entry.
4.3 Wi-Fi security tools:
Tools are particularly efficient in LAN network environ-
ments, because they implement extra functionalities, like
the ARP spoof capabilities that permit for communication
between hosts.
Wi-Fi AP Discovery Tools
Airodump-ng (Linux)
NetStumbler (Win)
Wi-Fi Raw Packet Capture Tools
Aircrack-ng Suite
Ettercap
Wi-Fi Traffic Analyzers TamoSoft
CommView for Wi-Fi
WireShark (formerly Ethereal)
Wi-Fi Vulnerability Scanners and Assessment Toolkits
6. Airbase
BackTrack Penetration Testing Distribution
Nmap, Zenmap
WiCrawl
5 CONCLUSIONS
One who connected to the network he/she think to protect
only their information from hacker but the thing to stop
the hackers hacking the network. We have proposed a sys-
tem to protect the infrastructure of the network and this
paper mainly concentrate on issues to identify the foot-
prints of the attackers. The hacker will not leave any type
of evidence to find him so there are the certain steps to
identify those hackers. Setting a wireless network is easier
but to protect the infrastructure of the created one is find to
be little difficult from vulnerabilities of outsiders. The at-
tackers enter through the weak holes present in the wire-
less environment and make the disturbance to the environ-
ment and to the authorized users. We can prevent it
the network from those attackers by applying few
methodolo- gies provide in this paper. We also used some
tools to hack the Wi-Fi infrastructure so that we are
able to find the hackers idea on attacking the network.
This paper also provides the technique to restrict the
hackers from future threatens.
In future, able solve the ARP weaknesses. We can
provide the built in functionality to expose the response
from the true source with certain protocols. Expanded
protocol is not available to say that one has to wait for
the request to send a response. Enhance security feature
of man-in-the- middle (MITM) attack from the hackers.
Authenticated users can have special encrypted key which
is use to pro- tect their information as well as the
infrastructure from the hackers to that network.
6 REFERENCES
[1]Frederick T. Sheldon, Oak Ridge National Laboratory,
John Mark Weber, Seong-Moo Yoo, and W. David
Pan, “Insecurity Of Wireless Network” University of
Alabama in Huntsville, IEEE Security & Privacy,
July/August
2012
[2] Jose Nazario, Arbor Networks, John Kristoff, “Internet
Infrastructure Security” Team Cymru - Copublished by
the IEEE Computer and Reliability Societies,
July/August
2012.
[3] O’Reilly, “802.11 Wireless Networks: The Definitive
Guide -2002” <e-book>.
[4] Jaemin Lee, Chaungoc Tu, Souhwan Jung, ”Man-in-
the-middle Attacks Detection Scheme on Smartphone
using 3G network”, Soongsil University Seoul, Korea,
2012.
[5] Kevin Hulin, Carsten Locke, Patrick Mealey, and
Ashley Pham, “Analysis of Wireless Security
Vulnerabilities, Attacks, and Methods of Protection ”, The
University of Texas at Dallas , July 2011.
[6] Thrinatha R Mutchukota, Saroj Kumar Panigrahy, and
Sanjay Kumar Jena, ” Man-in-the-Middle Attack and its
Countermeasure in Bluetooth Secure Simple Pairing”,
National Institute of Technology Rourkela, 769 008,
Odisha, India, 2011.
[7] Dennis D. Steinauer, “Network Security in a Wireless
World”, National Institute of Standards and
Technology,
2011.
[8] Utpal Paul, Anand Kashyap, Ritesh Maheshwari, and
Samir R. Das, “Passive Measurement of Interference
in WiFi Networks with Application in Misbehavior
Detection”, IEEE transactions on mobile computing, vol.
12, no. 3, march 2013
[9] Da Zhang, Member, “Enabling Efficient WiFi-Based
Vehicular Content Distribution”, IEEE, and Chai Kiat Yeo,
IEEE transactions on parallel and distributed systems, vol.
24, no. 3, march 2013
[10] Min-kyu Choi1, Rosslin John Robles, Chang-hwa
Hong and Tai-hoon Kim, “Wireless Network Security:
Vulnerabilities, Threats and Countermeasures”, Hannam
University, Daejeon, Korea, July 2008.
[11] Hyunuk Hwang, Gyeok Jung, Kiwook Sohn, Sangseo
Park, “A Study on MITM(Man in the Middle)
Vulnerability in Wireless Network Using 802.1X and
EAP”, The Attached Institute of ETRI, 2008.
[12] Pritam Gajkumar Shah (PhD, UC Australia),
“Securing Wireless Sensor Networks- Challenges and
Future Scope”, 2008
[13] Puneet kumar and Prof. J.K. Sharma ,“Capacity
Enhancement of 5G wireless networks”, (IJAEST)
International Journal Of Advanced Engineering
Sciences And Technologies Vol No. 10, Issue No. 2,
228 - 233,
2010.
[14] Prasant Mohapatra, Chair, “Capacity Enhancement
and Reliability of Wireless Mesh Networks”, Office of
graduate studies of the university of california davis, 2010.
[15] Yantao Li, Student Member, IEEE, Xin Qi,
Matthew Keally, Zhen Ren, Gang Zhou, Member,
IEEE, Di Xiao, Member, IEEE, and Shaojiang Deng,
Member, IEEE, “Communication Energy Modeling and
Optimization through Joint Packet Size Analysis of
BSN and WiFi Networks”, IEEE Transactions On
Parallel And Distributed Systems, 2012.
[16] Loukas Lazos and Marwan Krunz, University of
Arizona, “Selective Jamming/Dropping Insider Attacks in
Wireless Mesh Networks”, IEEE Network ,
January/February 2011.
7. Airbase
BackTrack Penetration Testing Distribution
Nmap, Zenmap
WiCrawl
5 CONCLUSIONS
One who connected to the network he/she think to protect
only their information from hacker but the thing to stop
the hackers hacking the network. We have proposed a sys-
tem to protect the infrastructure of the network and this
paper mainly concentrate on issues to identify the foot-
prints of the attackers. The hacker will not leave any type
of evidence to find him so there are the certain steps to
identify those hackers. Setting a wireless network is easier
but to protect the infrastructure of the created one is find to
be little difficult from vulnerabilities of outsiders. The at-
tackers enter through the weak holes present in the wire-
less environment and make the disturbance to the environ-
ment and to the authorized users. We can prevent it
the network from those attackers by applying few
methodolo- gies provide in this paper. We also used some
tools to hack the Wi-Fi infrastructure so that we are
able to find the hackers idea on attacking the network.
This paper also provides the technique to restrict the
hackers from future threatens.
In future, able solve the ARP weaknesses. We can
provide the built in functionality to expose the response
from the true source with certain protocols. Expanded
protocol is not available to say that one has to wait for
the request to send a response. Enhance security feature
of man-in-the- middle (MITM) attack from the hackers.
Authenticated users can have special encrypted key which
is use to pro- tect their information as well as the
infrastructure from the hackers to that network.
6 REFERENCES
[1]Frederick T. Sheldon, Oak Ridge National Laboratory,
John Mark Weber, Seong-Moo Yoo, and W. David
Pan, “Insecurity Of Wireless Network” University of
Alabama in Huntsville, IEEE Security & Privacy,
July/August
2012
[2] Jose Nazario, Arbor Networks, John Kristoff, “Internet
Infrastructure Security” Team Cymru - Copublished by
the IEEE Computer and Reliability Societies,
July/August
2012.
[3] O’Reilly, “802.11 Wireless Networks: The Definitive
Guide -2002” <e-book>.
[4] Jaemin Lee, Chaungoc Tu, Souhwan Jung, ”Man-in-
the-middle Attacks Detection Scheme on Smartphone
using 3G network”, Soongsil University Seoul, Korea,
2012.
[5] Kevin Hulin, Carsten Locke, Patrick Mealey, and
Ashley Pham, “Analysis of Wireless Security
Vulnerabilities, Attacks, and Methods of Protection ”, The
University of Texas at Dallas , July 2011.
[6] Thrinatha R Mutchukota, Saroj Kumar Panigrahy, and
Sanjay Kumar Jena, ” Man-in-the-Middle Attack and its
Countermeasure in Bluetooth Secure Simple Pairing”,
National Institute of Technology Rourkela, 769 008,
Odisha, India, 2011.
[7] Dennis D. Steinauer, “Network Security in a Wireless
World”, National Institute of Standards and
Technology,
2011.
[8] Utpal Paul, Anand Kashyap, Ritesh Maheshwari, and
Samir R. Das, “Passive Measurement of Interference
in WiFi Networks with Application in Misbehavior
Detection”, IEEE transactions on mobile computing, vol.
12, no. 3, march 2013
[9] Da Zhang, Member, “Enabling Efficient WiFi-Based
Vehicular Content Distribution”, IEEE, and Chai Kiat Yeo,
IEEE transactions on parallel and distributed systems, vol.
24, no. 3, march 2013
[10] Min-kyu Choi1, Rosslin John Robles, Chang-hwa
Hong and Tai-hoon Kim, “Wireless Network Security:
Vulnerabilities, Threats and Countermeasures”, Hannam
University, Daejeon, Korea, July 2008.
[11] Hyunuk Hwang, Gyeok Jung, Kiwook Sohn, Sangseo
Park, “A Study on MITM(Man in the Middle)
Vulnerability in Wireless Network Using 802.1X and
EAP”, The Attached Institute of ETRI, 2008.
[12] Pritam Gajkumar Shah (PhD, UC Australia),
“Securing Wireless Sensor Networks- Challenges and
Future Scope”, 2008
[13] Puneet kumar and Prof. J.K. Sharma ,“Capacity
Enhancement of 5G wireless networks”, (IJAEST)
International Journal Of Advanced Engineering
Sciences And Technologies Vol No. 10, Issue No. 2,
228 - 233,
2010.
[14] Prasant Mohapatra, Chair, “Capacity Enhancement
and Reliability of Wireless Mesh Networks”, Office of
graduate studies of the university of california davis, 2010.
[15] Yantao Li, Student Member, IEEE, Xin Qi,
Matthew Keally, Zhen Ren, Gang Zhou, Member,
IEEE, Di Xiao, Member, IEEE, and Shaojiang Deng,
Member, IEEE, “Communication Energy Modeling and
Optimization through Joint Packet Size Analysis of
BSN and WiFi Networks”, IEEE Transactions On
Parallel And Distributed Systems, 2012.
[16] Loukas Lazos and Marwan Krunz, University of
Arizona, “Selective Jamming/Dropping Insider Attacks in
Wireless Mesh Networks”, IEEE Network ,
January/February 2011.