This paper is mainly based on providing security to the wireless networks through which devices like Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating a wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of the data that is being exchanged. Data should be ensured as and then there will be a perfect implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to NS2 and implementation of that protocol by providing a wireless scenario.
Attacks and Risks in Wireless Network Securityijtsrd
Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18625.pdf
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
An overview of security and privacy challenges that must be faced and solved when creating new Things for the Internet of Things. We discussed why are Things inherently insecure together with examples of attack vectors and learned some risk mitigation strategies. We realized why should users be wary of Things violating their privacy and gained awareness of upcoming EU privacy legislation that affects providers of IoT-based solutions. Talk given at Pixels Camp 2017, Lisbon.
Attacks and Risks in Wireless Network Securityijtsrd
Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18625.pdf
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
An overview of security and privacy challenges that must be faced and solved when creating new Things for the Internet of Things. We discussed why are Things inherently insecure together with examples of attack vectors and learned some risk mitigation strategies. We realized why should users be wary of Things violating their privacy and gained awareness of upcoming EU privacy legislation that affects providers of IoT-based solutions. Talk given at Pixels Camp 2017, Lisbon.
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
This paper is on the exploration of Internet Network security. With the advent of the internet, security became a major concern for computer users, organizations and the Military. The internet structure itself allow for many security threats to occur. Knowing the attack methods, the architecture of the internet when modified can reduce the possible attacks that can be sent across the network. The internet can be secured by the means of VPN, IPSec, Anti‐Malware Software and scanners, Secure Socket Layer, intrusion‐detection, security management, firewalls and cryptography mechanisms. The essence of this research is to forecast the future of internet network security.
The growth of IoT is occurring at an incredible rate, justly raising alarms about IoT security and IoT privacy issues as we become increasingly reliant on these intelligent, interconnected devices in our lives and businesses. How are we to protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? Building an IoT solution involves securing sensors, devices, networks, cloud platforms, web applications, and mobile applications for diverse industries. This presentation examines the landscape of emerging security challenges posed by connected devices and offers a catalog of security deployment patterns that have been successfully used by some of the worlds most well known OEMs to deploy connected product fleets.
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
Work-in-Progress!
IoT Cyber+Physical+Social Security
An encyclopedic compendium of tools, techniques, and practices to defend systems that sit at the intersection of the cyber and physical domains; chiefly building automation systems and the Internet of Things.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
The Internet of Things (IoT) is thriving network of smart objects where one physical object can exchange information with another physical object. In today’s Internet of Things (IoT) the interest is the concealment and security of data in a network. The obtrusion into Internet of Things (IoT) exposes the extent with which the internet of things is vulnerable to attacks and how such attack can be detected to prevent extreme damage. It emphasises on threats, vulnerability, attacks and possible methods of detecting intruders to stop the system from further destruction, this paper proposes a way out of the impending security situation of Internet of things using IPV6 Low -power wireless personal Area Network.
Its is project based on one of the most interesting and wide topic of Computer Science, named Cyber Security
CONTENT :
1. What is Cyber Security
2. Why Cyber Security is Important
3. Brief History
4. Security Timeline
5. Architecture
6. Cyber Attack Methods
7. Technology for Cyber Secuirty
8. Development in Cyber Security
9. Future Trend in Cyber Security
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
-IoT Security is a Safety/Privacy Issue
-Consider the devices you bring into your home and to work
Video Links:
-Hue: https://www.youtube.com/watch?v=7TOsFqqJgj4
-Slow Cooker: https://www.walmart.com/ip/BLACK-DECKER-WiFi-Enabled-6-Quart-Slow-Cooker/128745799
-Smart Toilet: https://www.youtube.com/watch?v=HyZ7S4fE5v4
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. Thestudy is carried out through field evaluation of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures that can be taken to improve securityof the wireless network by the users.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
The introduction of Wi-Fi has created a plethora of chances for thieves.
Wireless security is the deterrence of unauthorized users from accessing and stealing data from your wireless network. To be more specific, wireless security protects a Wi-Fi network from unwanted access.
Only a minor flaw in your home Wi-Fi network can provide criminal access to nearly all devices that use that Wi-Fi. Access might cause issues with bank accounts, credit card information, kid safety, and a variety of other concerns.
Within this article are pertinent recommendations to assist you in protecting your home Wi-Fi network from illegal access.
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
This paper is on the exploration of Internet Network security. With the advent of the internet, security became a major concern for computer users, organizations and the Military. The internet structure itself allow for many security threats to occur. Knowing the attack methods, the architecture of the internet when modified can reduce the possible attacks that can be sent across the network. The internet can be secured by the means of VPN, IPSec, Anti‐Malware Software and scanners, Secure Socket Layer, intrusion‐detection, security management, firewalls and cryptography mechanisms. The essence of this research is to forecast the future of internet network security.
The growth of IoT is occurring at an incredible rate, justly raising alarms about IoT security and IoT privacy issues as we become increasingly reliant on these intelligent, interconnected devices in our lives and businesses. How are we to protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? Building an IoT solution involves securing sensors, devices, networks, cloud platforms, web applications, and mobile applications for diverse industries. This presentation examines the landscape of emerging security challenges posed by connected devices and offers a catalog of security deployment patterns that have been successfully used by some of the worlds most well known OEMs to deploy connected product fleets.
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
Work-in-Progress!
IoT Cyber+Physical+Social Security
An encyclopedic compendium of tools, techniques, and practices to defend systems that sit at the intersection of the cyber and physical domains; chiefly building automation systems and the Internet of Things.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
The Internet of Things (IoT) is thriving network of smart objects where one physical object can exchange information with another physical object. In today’s Internet of Things (IoT) the interest is the concealment and security of data in a network. The obtrusion into Internet of Things (IoT) exposes the extent with which the internet of things is vulnerable to attacks and how such attack can be detected to prevent extreme damage. It emphasises on threats, vulnerability, attacks and possible methods of detecting intruders to stop the system from further destruction, this paper proposes a way out of the impending security situation of Internet of things using IPV6 Low -power wireless personal Area Network.
Its is project based on one of the most interesting and wide topic of Computer Science, named Cyber Security
CONTENT :
1. What is Cyber Security
2. Why Cyber Security is Important
3. Brief History
4. Security Timeline
5. Architecture
6. Cyber Attack Methods
7. Technology for Cyber Secuirty
8. Development in Cyber Security
9. Future Trend in Cyber Security
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
-IoT Security is a Safety/Privacy Issue
-Consider the devices you bring into your home and to work
Video Links:
-Hue: https://www.youtube.com/watch?v=7TOsFqqJgj4
-Slow Cooker: https://www.walmart.com/ip/BLACK-DECKER-WiFi-Enabled-6-Quart-Slow-Cooker/128745799
-Smart Toilet: https://www.youtube.com/watch?v=HyZ7S4fE5v4
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. Thestudy is carried out through field evaluation of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures that can be taken to improve securityof the wireless network by the users.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
The introduction of Wi-Fi has created a plethora of chances for thieves.
Wireless security is the deterrence of unauthorized users from accessing and stealing data from your wireless network. To be more specific, wireless security protects a Wi-Fi network from unwanted access.
Only a minor flaw in your home Wi-Fi network can provide criminal access to nearly all devices that use that Wi-Fi. Access might cause issues with bank accounts, credit card information, kid safety, and a variety of other concerns.
Within this article are pertinent recommendations to assist you in protecting your home Wi-Fi network from illegal access.
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdropping becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper presents an approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE 802.11g WLAN.
A Literature Survey on Security Management Policies used in Wireless Domainijtsrd
Wireless is a term used to describe telecommunications in which electromagnetic waves rather than some form of wire carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing these are also sometimes classified as wireless. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. Nowadays wireless networks are the most popular way of communication. For example, internet services in companies, cafes, e markets and in homes. This paper will highlight the drawbacks and their proposed system to give continuous growth of new technologies in wireless domain, both for application and basic research. Papers should emphasize original results relating to the theory and or applications of wireless communications and networking. K. Senthil Kumar | P. Supraja | V. Sridharshini ""A Literature Survey on Security Management Policies used in Wireless Domain"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22854.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/22854/a-literature-survey-on-security-management-policies-used-in-wireless-domain/k-senthil-kumar
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESIJNSA Journal
In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.
1
Table of Contents
Wireless Network Security3
Introduction3
Overview of Wireless Technologies4
Standards of Wireless Specification:6
Security Features6
Wireless Threats7
Wireless Networks Attacks8
Conclusion9
References10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologies
The wireless technologies make the gadgets to have communication without any connection physically, implying that they do not need peripheral or network cabling. The wireless range from the complicated environments, for instance mobile networks that includes 3G mobile phones and local area networks, to less complicated gadgets such as microphones without wire, earphones and other gadgets which will not save or process data and usually used for small range procedures like infrared or communications via Bluetooth (BT) (Egners, Herrmann & Meyer,2015).
Typical IP network wireless devices or infrastructure
Access points or base stations
· Station wireless
· Router wireless
Retransmission devices (Sun, Yan, Zhang & Rong, 2015).
· Repeater wireless
· Network bridge wireless
End points
· Cards or adapters wireless
· Laptops
· PDAs
· Mobile telephones
Infrared devices, such as cordless computer keyboards, remote controls and mice all needs a direct line of sight between the receiver and transmitter to complete the link. Even though the infrared communication replaced by BT technology in most of the gadgets, some legacy standard gadgets still use IR for short range communication (Illiano, & Lupu, 2015).
Network classification of wireless networks
Wireless networks act as date transmitter mechanism between other wireless communications and the traditional wired networks. Wireless network can be structured in different ways but they are frequently categorized into 4 main categories based on their coverage range.
· Wireless wide area network (WWAN)
Which invol ...
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxdonnajames55
Composition Assistance - Topic Gun Control
Assignment 2: Your Research Paper's Annotated Bibliography
Revisit the topic that you listed in your research proposal from Module 1, and do some research. If you have some trouble, you may need to narrow it a bit to find appropriate academic source material. Your selected topic will be the topic for your final paper in this class.
For this assignment, you need to complete an annotated bibliography of the sources you are finding for your research paper. As you continue to work on your project, add to your list, so that when you are ready for your final draft you can remove the unused citations and all annotations. After these things are removed, and your page is re-titled “References,” it will be ready to submit as part of the final paper. Here are the things you should look for in a good annotated bibliography:
· You use at least three university-level resources that are authoritative, correct, unbiased, current, and coherent.
· Your title is “References,” not “Bibliography.” Your authors are listed in alphabetical order, and there is a short explanation after every citation.
· Your citations are APA formatted (with hanging indent) and each needed block of annotation text is in the appropriate order.
· The work is formatted in 12 point, Times New Roman font, with one inch margins all around.
· You offer a description of the source’s usefulness: statistics, clever quote, graph, table, fact, or other relevant information. If a source is not useful, you note that it is not going to be used in your paper.
5
Table of Contents
Wireless Network Security 3
Introduction 3
Overview of Wireless Technologies 4
Standards of Wireless Specification: 6
Security Features 6
Wireless Threats 7
Wireless Networks Attacks 8
Conclusion 9
References 10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologi.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
DOI : 10.5121/ijnsa.2013.5307 67
IMPLEMENTATION OF A SECURITY
PROTOCOL FOR BLUETOOTH AND WI-FI
U. Pavan Kumar
Dept. of Telecommunication Systems Engineering, AITTM, Amity University, Noida,
India.
Pavan21cool@gmail.com
ABSTRACT
This paper is mainly based on providing security to the wireless networks through which devices like
Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The
protocols that are required to provide security to wireless networks can be implemented by creating a
wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the
security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be
designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of
the data that is being exchanged. Data should be ensured as and then there will be a perfect
implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to
NS2 and implementation of that protocol by providing a wireless scenario.
KEYWORDS
Wireless Networks, NS2[1]
, Security Protocol, Bluetooth, Wi-Fi, Caesar Cipher[2]
,
Encryption/Decryption[2]
, Hash Function [2].
1. INTRODUCTION
Bluetooth technology is the open standard for wireless connections with the backers mostly from
the industries of mobile phones and computers. Bluetooth, however, is a radio-frequency (RF)
technology utilizing the unlicensed 2.4GHz Industrial-Scientific-Medical (ISM) band.
The applications which were targeted include PC and peripheral networking, hidden computing,
and data synchronization such as for address books and calendars. Other applications might be
comprised of home networking and home appliances of the future such as smart appliances,
heating systems, and entertainment devices. Ericsson was the initial developer. Later, Bluetooth
Special Interest Group (SIG) formalized it as an industrial standard. SIG, now, expanded to a
group of 1800 members though it was initially formed by Ericsson, Intel, Toshiba, Nokia and
IBM.
The important consideration for any network is its security. If a network gets an unauthorized
access then it can lead to cases like disclosure of sensitive information, modification of data,
denial of service, illicit use of resources etc. Such unauthorized access grants the access to
2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
68
information which can reveal the usernames and passwords which can be later misused for further
attacks.
Not just wired LANs but WLANs are also subjected to all the security issues. In addition to these,
WLANs also have many more vulnerabilities that are associated with wireless connectivity and
prone to attacks. The nature of the wireless communicating medium makes it practically
impossible to confine the radio signals to an area that is controlled. These radiated signals are
subject to and effected by clandestine interception and exploitation.
If we take the case of a wired LAN, the attacker must physically connect some wires to the
network to gain access to the resources and such protection is not available for a WLAN. This is
because of remote access of any wireless networks. This implies that anyone using compatible
wireless equipment can potentially access the LAN.
To mitigate or to control these security concerns, encryption/decryption is used in an attempt to
make the signal unusable by unauthorized parties if any interception takes place. Any user wishes
to have a easy to use policy for a system and this became the primary concern for most
commercial products. Due to this, all the current 802.11 WLAN devices are bound by this
concern. This led to a default option of turning off the security features temporarily and this
creates a way for the attacker.
2. NEED FOR WIRELESS SECURITY
Wireless security has the top priority in prevention of unauthorized access or damage to
computers mainly using wireless networks. The most common systems of wireless security
currently working are WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access).
WEP is one among the least secure forms of security.
FBI has cracked a network which was secured using WEP in a span of 3 minutes. WEP is a very
old IEEE 802.11 standard available from 1999 which was outdated in 2003 by the entry of
WPA.WPA has overcome the drawbacks of WEP and has become an alternative to it quickly.
WPA2 is the present standard and is supportable only through upgraded firmware. Encryption is
the special feature of WPA2.
Many laptops have wireless cards pre-installed in them. Wireless networking is prone or
vulnerable to some security issues. Hackers have found wireless networks relatively easy to break
into, and even use wireless technology to hack into the wired networks also. Due to this, it has
become necessary for the enterprises to build a system that protects the network from
unauthorized access and such a system is WIPS (Wireless Intrusion Prevention System) or WIDS
(Wireless Intrusion Detection System).
The risks to users of the wireless devices have increased as the services have become much
popular. There were relatively few dangers when the introduction of wireless technology took
place. During the early stages of wireless, hackers have no way to get adapted to the technology
as the work place is mostly a wired environment. But currently, the ignorance and carelessness of
the users and the corporate brought many risks in security.
3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
69
Hacking methods have become much more sophisticated and innovative with wireless. These
days hacking is an interesting concept for many as Linux and windows have brought some easy
while using methods in their systems without any charge.
2.1. Background
Anyone within the range of a geographical network of an open and unencrypted wireless network
can sniff or capture and record the traffic through which one can gain unauthorized access to
internal network resources as well as to the internet, and then can use the information and
resources to perform disruptive or illegal acts. These unauthorized accesses are the current main
issues for home networks and as well as for enterprises.
If router security is not active or if the owner simply deactivates it for his convenience, it creates a
free hotspot. Since most of the 21st-century laptops have built in wireless networking, a third part
adapter installation is not at all required. There is a default option through which we can enable
the built-in wireless networking without giving any indication to the owner. This makes
broadcasting, much easier, which connects all the nearby computers.
Internet Connection Sharing is a tool that makes an easy way to the users to setup a WLAN. This
feature is available in all the latest operating systems. If the user does not know about the setup
then it will become a way for the attacker to steal all the information through the base station
which makes the WLAN. It may even be without the knowledge of the intruders if their computer
automatically selects a nearby unsecured wireless network to be used as an access point.
All the user related features are made easy by the vendors and this brought the threat situation in
to the wireless environment.
2.2. The Threat Situation
Wireless security is one of the aspects of computer security. Rogue access points are the primary
cause for making the organizations prone to the attacks.
Vulnerabilities are common for any wireless network. For suppose, if a person working in an
organization has entered in to the network through an unsecured port then he has given the start to
crash the entire network. This also gives a key hole to drag all the sensitive and confidential
information present in the network.
Vulnerabilities can be eradicated through the counter measures which are effective. One of them
is to deactivate the unused ports within the network and later for using that port we can get some
authorization. Such countermeasures must be effectively implemented and any ignorance
damages the entire counter measure.
So, by undergoing the threats of wireless technology, we can understand the critical condition of
needing security to wireless networks. This need was in many minds which led to build security
features and new protocols for wireless networks like Bluetooth, Wi-Fi, etc.
4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
70
The protocol in this paper is also about the security that a protocol can give to a wireless device if
used as an application or as a feature if added to the protocol architecture.
3. IMPLEMENTATION
3.1. Introduction to NS2
Every person interested in networking has to study the behavior of the network. The network
might be wired or wireless. This is the main job of a network simulator. The simulation carried
out here is a method which creates a hypothetical network environment and makes it functional to
study the network behavior. NS2 is among such simulation tools but it is not just another
simulator like others. It is used all around the world and is available at no cost. Although in initial
stages it make us feel like a hard bone but a little hard work, interest and guidance can make
anyone, a master of NS2 in a little span.
3.2. Installation of NS2
Linux/Unix based systems are the primary operating systems in which NS2 can be installed. It is
also available on Windows based systems which is used with the help of Cygwin. Installation on
Linux/Unix is almost same and no extra tool is required to run NS2, but for a Windows based
system, Cygwin software is needed in addition to a huge number of files. So if anyone has both
options to work on a Linux based or a Windows based system, it is advisable to go for Linux
based system.
NS2 comes with a set of protocols which are large in number and are used in different kind of
networks as well as different scenarios in real life. The current version used is version 2.3.5 which
comes with a total of 72 various protocols. Installation errors are frequent with many users and
are often solved by many developers from time to time. As and when the software is developed, it
gets validated for making it use for many interested ones who wanted to work with NS2.
3.3. NS2's Strength
NS2 lets researchers to simulate wired as well as wireless networks. Simulation can be done
through static as well as dynamic nodes in this simulator. It also lets users to monitor behavior of
a network. It gives the user an environment to create a new protocol and use it to the existing
codes. NS2 supports TCL and Object Oriented TCL for the simulation purpose. If implementation
is required then C++ code can be used along with TCL/OTCL.
3.4. Problem with NS2
Network Simulator-2 is an open source and very popular network simulation tool that provides
support for IP protocols suite and many standard routing protocols for wired and wireless
networks. Implementation of security on NS-2 is a necessary task in network simulation. NS2 has
no way to support security features unless some protocols are added. So, a new protocol is
designed in this project to give security features to NS2.
5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
71
Here, a new protocol must be added and it should be provided with some functions related to
security functions like providing encryption and decryption. Such a work is mentioned in the
following sections of this paper.
4. ADDITION OF A NEW PROTOCOL TO NS2
4.1. Approach to NS2
NS-2 is one of the open source systems, which is created, executed and developed using C++ and
Tool Control Language (TCL). Any researcher hungry to add new features and components to
NS2 can easily add them.
The current latest version of the software is 2.35. A huge number of protocols are added in this
version. MAC layer protocols and application protocols are the special features of this version.
Routing protocols are also separately available as there are the cases of wired and wireless
networks. Any new protocol can also be added by any one and can adopt it into NS2.
Our current problem is security and so we focus on adding some security features in the form of
protocols to the software. In this project, we are adding a protocol to the Internet Protocol layer.
Data integrity, encryption and decryption are implemented on the packet by this protocol. We
consider our data as plain text.
The cryptography algorithm is CESAR cipher. The programming language is C++.
Environment development requirements:
- Personal Computer Windows XP professional and later.
- Cygwin UNIX Simulation
- NS-2 version 2.35
- C/C++ editor.
4.2. Algorithm To Add A Protocol to NS2:
For any procedure to be implemented, we need a set of steps. These steps define the algorithm for
the procedure. Similarly, for the protocol to be added we require a systematic set of steps. This
algorithm is the best way to add a protocol to NS2. All the steps must be performed in an orderly
manner and not doing so will bring errors in the procedure. The following are the steps followed
in protocol addition to NS2.
a) Create a new header file SP.h for the protocol.
b) Create SP.cc file which contains the required code to execute the protocol.
c) Add the protocol ID to the packet.h file of NS2.
d) Edit enum packet_t() and p_info() files of packet.h.
e) Add the default value of the protocol to ns-default.tcl file.
f) Add an entry for the new protocol packets in the file ns-packet.tcl.
g) Add the file SP.o to the list of object files for NS in makefile.in file.
h) Recompile NS2 software
6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
72
5. LOGICAL DESIGN OF ENCRYPTION/DECRYPTION SYSTEM
Figure 1: Logical design of the encryption/decryption system
6. PROGRAM CODE
SP.h:
#ifndef ns_SP_h
#define ns_SP_h
#include "agent.h"
#include "tclcl.h"
#include "packet.h"
#include "address.h"
#include "ip.h"
struct hdr_SP {
char ret;
double send_time;
double rcv_time;
int seq;
char data[128];
7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
73
unsigned int hashvalue;
// Header access methods
static int offset_;
inline static int& offset() { return offset_; }
inline static hdr_SP* access(const Packet* p) {
return (hdr_SP*) p->access(offset_);
}
};
class SPAgent : public Agent {
public:
SPAgent();
int seq;
int oneway;
virtual int command(int argc, const char*const* argv);
virtual void recv(Packet*, Handler*);
void encryption(char* out);
void decryption(char* out);
unsigned int hashing (char value[], unsigned int len);
};
#endif // ns_SP_h
SP.cc:
#include "SP.h"
#include "string.h"
int hdr_SP::offset_;
static class SPHeaderClass : public PacketHeaderClass {
public:
SPHeaderClass() :
8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
74
PacketHeaderClass("PacketHeader/SP",sizeof(hdr_SP)) {
bind_offset(&hdr_SP::offset_);
}
} class_SPhdr;
static class SPClass : public TclClass {
public:
SPClass() : TclClass("Agent/SP") {}
TclObject* create(int, const char*const*) {
return (new SPAgent());
}
} class_SP;
SPAgent::SPAgent() : Agent(PT_SP), seq(0),
oneway(0)
{
bind("packetSize_", &size_);
}int SPAgent::command(int argc, const char*const* argv)
{
if (argc ==3)
{
if (strcmp(argv[1], "send") == 0)
{
Packet* pkt = allocpkt();
hdr_SP* hdr = hdr_SP::access(pkt);
hdr->ret = 0;
hdr->seq = seq++;
hdr->send_time = Scheduler::instance().clock();
strcpy(hdr->data, argv[2]);
9. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
75
hdr->hashvalue = hashing(hdr->data,(unsigned int)strlen(hdr->data));
printf("Sent message %s with hashing %dn",hdr->data,hdr->hashvalue);
// ---------- encrypt the data ---------------
encryption(hdr->data);
// Send the packet
send(pkt, 0);
return (TCL_OK);
}else if (strcmp(argv[1], "start-WL-brdcast") == 0)
{
Packet* pkt = allocpkt();
hdr_ip* iph = HDR_IP(pkt);
hdr_SP* ph = hdr_SP::access(pkt);
strcpy(ph->data, "test");
iph->daddr() = IP_BROADCAST;
iph->dport() = iph->sport();
ph->ret = 0;
send(pkt, (Handler*) 0);
return (TCL_OK);
} else if (strcmp(argv[1], "oneway") == 0) {
oneway=1;
return (TCL_OK);
}
}
return (Agent::command(argc, argv));
}
10. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
76
// -- CESAR encryption function ----------
void SPAgent::encryption(char out[])
{
int key =3;
int i=0;
for (i=0;i<strlen(out);i++)
{
out[i]=(out[i]+key)%128;
}
}
void SPAgent::decryption(char out[]){
int key =3;
int i=0;
for (i=0;i<strlen(out);i++){
out[i]=(out[i]-key)%128;
}
}
unsigned int SPAgent::hashing(char value[], unsigned int len){
char *word = value;
unsigned int ret = 0;
unsigned int i;
for(i=0; i < len; i++){
int mod = i % 32;
ret ^=(unsigned int) (word[i]) << mod;
ret ^=(unsigned int) (word[i]) >> (32 - mod);
}
return ret;
11. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
77
}
void SPAgent::recv(Packet* pkt, Handler*){
hdr_ip* hdrip = hdr_ip::access(pkt);
hdr_SP* hdr = hdr_SP::access(pkt);
if ((u_int32_t)hdrip->daddr() == IP_BROADCAST){
if (hdr->ret == 0){
printf("Recv BRDCAST SP REQ : at %d.%d from %d.%dn", here_.addr_, here_.port_, hdrip-
>saddr(), hdrip->sport());
Packet::free(pkt);
Packet* pktret = allocpkt();
hdr_SP* hdrret = hdr_SP::access(pktret);
hdr_cmn* ch = HDR_CMN(pktret);
hdr_ip* ipret = hdr_ip::access(pktret);
hdrret->ret = 1;
ipret->daddr() = IP_BROADCAST;
ipret->dport() = ipret->sport();
send(pktret, 0);
}else
{
printf("Recv BRDCAST SP REPLY : at %d.%d from %d.%dn", here_.addr_,
here_.port_, hdrip->saddr(), hdrip->sport());
Packet::free(pkt);
}
return;
}
if (hdr->ret == 0){
double stime = hdr->send_time;
12. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
78
char original_data[128];
char encrypted_data[128];
strcpy(encrypted_data,hdr->data);
strcpy(original_data,hdr->data);
int rcv_seq = hdr->seq;
char out[105];
unsigned int newhash;
char authenticate_result[50];
decryption(original_data);
newhash=hashing(original_data,strlen(original_data));
if(newhash==hdr->hashvalue){
printf("data intergity ensuredn");
strcpy(authenticate_result,"Message_Accepted");
}else
{
printf("data modified %dn",newhash);
strcpy(authenticate_result,"MESSAGE_ERRROR-Integrity violation");
}
sprintf(out, "%s recv %d %3.1f %s %s %d", name(), hdrip->src_.addr_ >>
Address::instance().NodeShift_[1],(Scheduler::instance().clock()-hdr-
>send_time)*1000,encrypted_data,
original_data,hdr->hashvalue);
Tcl& tcl = Tcl::instance();
tcl.eval(out);
// Discard the packet
Packet::free(pkt);
// Create a new packet
13. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
79
Packet* pktret = allocpkt();
// Access the header for the new packet:
hdr_SP* hdrret = hdr_SP::access(pktret);
hdrret->ret = 1;
hdrret->send_time = stime;
hdrret->rcv_time = Scheduler::instance().clock();
hdrret->seq = rcv_seq;
strcpy(hdrret->data, authenticate_result);
send(pktret, 0);
}
else
{
char out[105];
sprintf(out, "%s recv %d %3.1f %s _ %d", name(), hdrip->src_.addr_ >>
Address::instance().NodeShift_[1],
(Scheduler::instance().clock()-hdr->send_time) * 1000, hdr->data, hdr->hashvalue);
Tcl& tcl = Tcl::instance();
tcl.eval(out);
// Discard the packet
Packet::free(pkt);
}
}
The tcl file can be created as per our own imagination of the wireless scenario using NS2. But the
coding must be done including the SP protocol agent in it.
Tcl file is very important because it is the only way to bring our idea of network environment to
reality. To study a network, we first need to create a scenario that defines the network and this is
fulfilled through the tcl script.
14. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
80
7. DEMONSTRATION & RESULTS
For the demonstration to be carried out, we need a scenario consisting of four wireless nodes.
Node 0, 1 will send message to node 2 and 3 respectively and from node 2 and 3 back to node 0
and 1.An acknowledgement will be assumed by each sender node from the receiver node. This
scenario is created using the TCL language. We use a script file to arbitrarily send the message.
The following figures are the proofs to the demonstration. The first figure shows the message
transfer from node 0 to node 2. The second figure shows the message transfer from node 1 to
node 3. The third figure consists of the generated output. It shows the message transmitted and
hash value being used in the transfer. Data integrity is also assured in the third figure.
Figure 2: Message being sent from node 0 to node 2
15. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
81
Figure 3: Message transfer from node 1 to node 3
Figure 4: Data Encrypted, Decrypted and Ensured
16. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
82
8. CONCLUSIONS
Security in wireless networks can be assured if security protocols are being constructed and
implemented on the network. NS2 is providing an environment to check such protocols and there
are other software too for such protocol checks. SP protocol provides the security by encrypting
the message and prevents the attackers from being attacked. The default key used for CEASAR
cipher here is 3 and it can be increased to provide some complexity for the hackers. Not just
CEASER cipher, the algorithms can be many to provide encryption like DES, 3DES, EAS,
Blowfish etc.
Bluetooth devices can be secured using this protocol, This is because it’s the data that’s being
encrypted here but not the pairing key(which is already provided by Bluetooth). Bluetooth
implementation can also be checked by replacing the nodes here with the devices. Though there
are many protocols or algorithms are made, they might get hacked and the data can be captured.
So, maintaining and altering the codes and increasing the complexity in the encryption provide
better security.
Finally, providing security is not just based on the protocols being used but the user must also be
cautious from getting attacked. This is because as there are many ways to protect your network
same as there are ways to break the security. This is possible only if the user gives some lead to
the hacker by getting attracted to his tricks. So, security protocols are safe, strong and secure until
and unless the algorithms being used in them are cracked.
ACKNOWLEDGEMENTS
It is my utmost duty and desire to express acknowledgement to the various torch bearers, who
have rendered valuable guidance during the preparation of my paper.
Firstly, I would like to thank Prof. R. K. Kapur, Dy. Director & Head, AITTM, AUUP for his
inspiring support to our academic efforts.
It is a great pleasure for me to acknowledge my profound sense of gratitude to my guide Mrs.
Neha Arora, Assistant Professor, AITTM for her valuable and inspiring guidance, comments,
suggestions and encouragement throughout this paper.
I am grateful to my beloved Lt. Gen. P D Bhargava, Group Dy. Vice Chancellor, AUUP &
Advisor, AITTM for providing me a platform in the form of this great institution to showcase my
talent.
Finally, I sincerely thank all those who have helped me in the endeavor of completing this paper.
I should also like to thank entire fellow colleagues who really helped me directly or indirectly,
whenever needed.
And my deepest thanks to my parents who, have constantly encouraged fulfilling a part of my
goal completely and successfully.
17. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
83
REFERENCES
[1] http://sce.uhcl.edu/transa/Sourcecode/NS-2_Security_Node_Document.doc
[2] http://www.isi.edu/nsnam/ns/tutorial/index.html
[3] http://wn.com/Edimax_ADSL_Modem_Router__Setup_WPA_Wireless_Security
[4] http://wn.com/Edimax_Broadband_router__Setup_WPA_Wireless_Security
[5] http://en.wikipedia.org/wiki/Wireless_security
[6] Behrouz A. Forouzan & Debdeep Mukhopadhyay (2008) “Cryptography and Network Security”,
Second Edition, Tata McGraw Hill Education Private Limited.
Authors
I’m Udaragudi Pavan Kumar, born on 28th
of April,1991.I’m currently persuing M.Tech
in Telecommunication Systems Eng. Of batch 2012-2014. I’m interested in networking
which made me to do this paper.