The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. Thestudy is carried out through field evaluation of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures that can be taken to improve securityof the wireless network by the users.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Evaluation of enhanced security solutions inIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially
vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used
to find them are mobile and easy to access. Securing wireless networks can be difficult because these
networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to
compromise it. In recent years, a range of technologies and mechanisms have helped makes networking
more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related
authentication, confidentiality and integrity problems. It discovered that strength of each solution depends
on how well the encryption, authentication and integrity techniques work. The work suggested using a
Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth
comparative analysis of each of the security mechanisms is driven by review of related work in WLAN
security solutions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Evaluation of enhanced security solutions inIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially
vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used
to find them are mobile and easy to access. Securing wireless networks can be difficult because these
networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to
compromise it. In recent years, a range of technologies and mechanisms have helped makes networking
more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related
authentication, confidentiality and integrity problems. It discovered that strength of each solution depends
on how well the encryption, authentication and integrity techniques work. The work suggested using a
Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth
comparative analysis of each of the security mechanisms is driven by review of related work in WLAN
security solutions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
This paper is mainly based on providing security to the wireless networks through which devices like
Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The
protocols that are required to provide security to wireless networks can be implemented by creating a
wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the
security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be
designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of
the data that is being exchanged. Data should be ensured as and then there will be a perfect
implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to
NS2 and implementation of that protocol by providing a wireless scenario.
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to
rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus
or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection
System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data
created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for
anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack
signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with
the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System
called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in
detecting abnormal content in the traffic data during information passing from one node to another and
also detects known attack signature and unknown attack. This approach is tested by running the artificial
network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and
availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN
integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS)
attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared
to Kumar et al. protocol.
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
Mobile Ad Hoc Networks (MANETs) are more vulnerable
to different attacks. Prevention methods as
cryptographic techniques alone are not sufficient t
o make them secure; therefore, efficient intrusion
detection must be deployed and elaborated to facili
tate the identification of attacks. An Intrusion De
tection
System (IDS) aims to detect malicious and selfish n
odes in a network. The intrusion detection methods
used
normally for wired networks can no longer adequate
when adapted directly to a wireless ad-hoc network,
so existing techniques of intrusion detection have
to be changed and new techniques have to be determi
ned
to work efficiency and effectively in this new netw
ork architecture of MANETs. In this paper we give a
survey of different architectures and methods of in
trusion detection systems (IDSs) for MANETs
accordingly to the recent literature.
Attacks and Risks in Wireless Network Securityijtsrd
Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18625.pdf
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
This study proposes using machine learning to improve Wi-Fi network security. As Wi-Fi networks spread
from industrial to residential areas, the necessity for strong security has risen. The rise of smart
networking, especially in the IoT, has created data security and vulnerability issues. A unique method that
uses machine learning to detect abnormalities and probable security breaches in Wi-Fi networks addresses
these difficulties. We gather, preprocess, and analyse network data to create a complete dataset. This
dataset trains machine learning algorithms to identify and classify network anomalies. Using agile
methods, data mining, and machine learning algorithms, we created a Wi-Fi network intrusion detection
system (WNIDS) that can detect diverse network threats. The proposed WNIDS contains two linked stages
with specific machine learning models. These algorithms accurately classify network data as normal or
attack specific. Our technology protects against malicious attacks and provides a robust Wi-Fi network for
users across domains by incorporating machine learning. Modern network security dangers were fully
understood by surveys and data analysis. The WNIDS was implemented and deployed through a structured
system development life cycle. This tool eliminates network weaknesses and advances distant enterprises,
offering safe and smooth access for consumers globally.
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
This paper is mainly based on providing security to the wireless networks through which devices like
Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The
protocols that are required to provide security to wireless networks can be implemented by creating a
wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the
security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be
designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of
the data that is being exchanged. Data should be ensured as and then there will be a perfect
implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to
NS2 and implementation of that protocol by providing a wireless scenario.
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to
rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus
or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection
System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data
created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for
anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack
signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with
the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System
called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in
detecting abnormal content in the traffic data during information passing from one node to another and
also detects known attack signature and unknown attack. This approach is tested by running the artificial
network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and
availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN
integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS)
attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared
to Kumar et al. protocol.
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
Mobile Ad Hoc Networks (MANETs) are more vulnerable
to different attacks. Prevention methods as
cryptographic techniques alone are not sufficient t
o make them secure; therefore, efficient intrusion
detection must be deployed and elaborated to facili
tate the identification of attacks. An Intrusion De
tection
System (IDS) aims to detect malicious and selfish n
odes in a network. The intrusion detection methods
used
normally for wired networks can no longer adequate
when adapted directly to a wireless ad-hoc network,
so existing techniques of intrusion detection have
to be changed and new techniques have to be determi
ned
to work efficiency and effectively in this new netw
ork architecture of MANETs. In this paper we give a
survey of different architectures and methods of in
trusion detection systems (IDSs) for MANETs
accordingly to the recent literature.
Attacks and Risks in Wireless Network Securityijtsrd
Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18625.pdf
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
This study proposes using machine learning to improve Wi-Fi network security. As Wi-Fi networks spread
from industrial to residential areas, the necessity for strong security has risen. The rise of smart
networking, especially in the IoT, has created data security and vulnerability issues. A unique method that
uses machine learning to detect abnormalities and probable security breaches in Wi-Fi networks addresses
these difficulties. We gather, preprocess, and analyse network data to create a complete dataset. This
dataset trains machine learning algorithms to identify and classify network anomalies. Using agile
methods, data mining, and machine learning algorithms, we created a Wi-Fi network intrusion detection
system (WNIDS) that can detect diverse network threats. The proposed WNIDS contains two linked stages
with specific machine learning models. These algorithms accurately classify network data as normal or
attack specific. Our technology protects against malicious attacks and provides a robust Wi-Fi network for
users across domains by incorporating machine learning. Modern network security dangers were fully
understood by surveys and data analysis. The WNIDS was implemented and deployed through a structured
system development life cycle. This tool eliminates network weaknesses and advances distant enterprises,
offering safe and smooth access for consumers globally.
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used to find them are mobile and easy to access. Securing wireless networks can be difficult because these networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to compromise it. In recent years, a range of technologies and mechanisms have helped makes networking more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related authentication, confidentiality and integrity problems. It discovered that strength of each solution depends on how well the encryption, authentication and integrity techniques work. The work suggested using a Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth comparative analysis of each of the security mechanisms is driven by review of related work in WLAN security solutions.
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IJNSA Journal
This paper is mainly based on providing security to the wireless networks through which devices like Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating a wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of the data that is being exchanged. Data should be ensured as and then there will be a perfect implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to NS2 and implementation of that protocol by providing a wireless scenario.
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
1
Table of Contents
Wireless Network Security3
Introduction3
Overview of Wireless Technologies4
Standards of Wireless Specification:6
Security Features6
Wireless Threats7
Wireless Networks Attacks8
Conclusion9
References10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologies
The wireless technologies make the gadgets to have communication without any connection physically, implying that they do not need peripheral or network cabling. The wireless range from the complicated environments, for instance mobile networks that includes 3G mobile phones and local area networks, to less complicated gadgets such as microphones without wire, earphones and other gadgets which will not save or process data and usually used for small range procedures like infrared or communications via Bluetooth (BT) (Egners, Herrmann & Meyer,2015).
Typical IP network wireless devices or infrastructure
Access points or base stations
· Station wireless
· Router wireless
Retransmission devices (Sun, Yan, Zhang & Rong, 2015).
· Repeater wireless
· Network bridge wireless
End points
· Cards or adapters wireless
· Laptops
· PDAs
· Mobile telephones
Infrared devices, such as cordless computer keyboards, remote controls and mice all needs a direct line of sight between the receiver and transmitter to complete the link. Even though the infrared communication replaced by BT technology in most of the gadgets, some legacy standard gadgets still use IR for short range communication (Illiano, & Lupu, 2015).
Network classification of wireless networks
Wireless networks act as date transmitter mechanism between other wireless communications and the traditional wired networks. Wireless network can be structured in different ways but they are frequently categorized into 4 main categories based on their coverage range.
· Wireless wide area network (WWAN)
Which invol ...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio in the wireless network is very high as well as packets may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the performance of WLAN
A Literature Survey on Security Management Policies used in Wireless Domainijtsrd
Wireless is a term used to describe telecommunications in which electromagnetic waves rather than some form of wire carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing these are also sometimes classified as wireless. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. Nowadays wireless networks are the most popular way of communication. For example, internet services in companies, cafes, e markets and in homes. This paper will highlight the drawbacks and their proposed system to give continuous growth of new technologies in wireless domain, both for application and basic research. Papers should emphasize original results relating to the theory and or applications of wireless communications and networking. K. Senthil Kumar | P. Supraja | V. Sridharshini ""A Literature Survey on Security Management Policies used in Wireless Domain"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22854.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/22854/a-literature-survey-on-security-management-policies-used-in-wireless-domain/k-senthil-kumar
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
Security in wireless network is one of the prime concern in todays Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an overhead in terms of increased load in the network. Further the increased load in the network paves path to congestion which degrades the performance of the wireless network. In this paper we try to highlight various challenges pertaining to security in mesh networks and the ways of reducing security threats. We propose an improved version of AODV which has a congestion avoidance mechanism. We also use a security technique called PGP for enhanced security of Mesh network. Mankiran Kaur | Jagjit Kaur"Security Technique and Congestion Avoidance in Mesh Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4690.pdf http://www.ijtsrd.com/engineering/computer-engineering/4690/security-technique-and-congestion-avoidance-in-mesh-network/mankiran-kaur
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdropping becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper presents an approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE 802.11g WLAN.
Similar to Wireless Networks Security in Jordan: A Field Study (20)
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Wireless Networks Security in Jordan: A Field Study
1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5403 43
Wireless Networks Security in Jordan: A Field
Study
Ahmad S. Mashhour1
&Zakaria Saleh2
1
IS Dept, University of Bahrain
Mashhour_ahmad@yahoo.com
2
MIS Dept,
Yarmouk University, Jordan
Drzaatreh@aim.com
ABSTRACT
The potential of wireless communications, has resulted in a wide expand of wireless networks. However,
the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for
unauthorized users to access the computer networks.This research evaluates the deployed Wireless
Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will
be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of
freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping
network administrators make their systems more secure. Thestudy is carried out through field evaluation
of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures
that can be taken to improve securityof the wireless network by the users.
KEY WORDS
Security, Wardriving, Wireless Local Area Network (WLAN), Wired Equivalent Privacy (WEP).
1. INTRODUCTION
Wireless networks have evolved rapidly in the last few years due to the developments of new
wireless standards and cost-effective wireless hardware. This has led to widespread adoption of
the technology in home and small businesses. With the growth of wireless networking, security is
the main weakness of the whole wireless system, which resulted in improper uses of network
resources. The deployment of wireless networks can potentially make private networks subject to
public use. As wireless access increases, security becomes an even more important issue.
Wardriving is a common practice at which an individual equipped with electronic devices capable
for wireless access, wanders in the streets with the aim to locate wireless networks for access to
the Internet, either house-based or corporate-based wireless networks, map their existence, and
hack them. It is using a laptop equipped with awireless LAN adapter or smart mobile phone, and
randomly driving around looking for unsecured wireless LANs. This paper provides evidence
through a study of how users configure and protect their wireless Internet access points (APs).
Wireless networks require a Service Set Identifier (SSID),which represents the name of the
wireless network, whichdistinguishes between the wireless networks and offers the ability for the
users to identify and use them. If configured to auto-connect, is practical for a client adapter
toconnect to an AP, orsimply click on the SSID of a selected AP (SSIDs can be found in the
client’s list of available wireless networks under “Network and Sharing Center”). This research
will evaluate the wireless networks in Jordan, and see if the networks are protected from such
actions.
2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
44
2. BACKGROUND
Wireless networking is one of growing technologies being deployed today, from home networks
to corporate level wireless networks. Businesses as well as general users are trying to take
advantage of the benefits which wireless networking providessuch ascost effectiveness, flexibility
and easy to use.Howeverthere has been an increasing demand for greater security in
businesses.Most network threats come from the ignorance of users, the inactive attitudes of
corporations, and the improper implementation of security features by wireless devices
manufacturers[1]. The lack ofsufficient learning materials and or support for users’ wireless
connections at home, as well as public places wireless access poses a critical threat to the systems
as well as the information these systems host. Some researchers suggest that with the increased
demand for wireless connections, comes a growing concern about the security and protectionthe
wireless networks [2-5, 20].For more details about wireless network problems and solution see[6-
10, 25,26].
As communication technology advances, there is a good amount of Wi-Fi networks in populated
areas in Jordan. Finding many of these networks does not take much efforts when using some of
the tools that can be obtained from the Internet.To automate the searching for wireless access
points, many software tools have been developed that allows for detecting Wireless Local Area
Networks (WLANs). The Software is available for free on the Internet [11], (e.g. NetStumbler for
Windows, SWScanner for Linux and KisMac for Macintosh). This softwarewasmainlydesigned
and used to insure that a wireless network is set up properly and as it is intended for,or be used to
locatepoor coverage within a WLAN, detect any networks interference, and discover any
unapproved "rogue" access points in the company’s network. Regrettably, wireless networks are
susceptible to attacks if not protected properly[11, 24].Therefore, this toolcan be used by hackers
to obtain access to open or inadequately secured networks, in the commonly known"Wardriving"
access.We believe that Wardriving is an activity that many can participate in with low cost and
minimal technical expertise [22].
3. SIGNIFICANCE OF THE STUDY AND RESEARCH OBJECTIVES
Achieving a perfectly acceptable wireless network security performance has not been very easy.
The significant of this research is that no other similar testing was conducted in Jordanto provide
an evaluation of the wireless networks security in any Jordanian city. Conducting this research is
essential because it tries to identifythe wireless network security issues that thesewidely deployed
networks maybe facing. The findings of this research should be considered by network owners
and the Wireless Internet Service Providers (WISP) to review the recommendations regarding the
threats facing their networks, and then, decide the suitable security measures needed to be taken
to reduce and/or possibly eliminate these threats.
Because there are so many vulnerabilities associated with wireless networks, there are a lot of
tools available to penetration testers for exploiting them. It is important for security professionals
(including security auditors) to be familiar with the tools used to spoof MAC addresses,
deauthenticateclients from the network, capture traffic, re-inject traffic, and crack Wired
Equivalent Privacy (WEP) or the WLAN Protected Access (WPA). The proper use of these skills
will help a security auditor perform an effective WLAN penetration test. It is essential for the
system security teams running the wires networks in Jordan to have a complete understanding of
the existing wireless network threats andhow these threats can be exploited, to determine the
3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
45
appropriate defense techniques to prevent attacks or unauthorized access to their wireless
networks.
3.1 Research Questions:
The research answers questions about the security status of wireless networks in Jordan, and how
to achieve acceptable wireless security performance. These questions are:
i) Wireless networks are inherently insecure. Can this be actually true about Wireless
networks in Jordan?
ii) What are the current approaches used for protecting wireless network and preventing
unauthorized users to access the network?
iii) What is the level of threats facing the wireless networks in Jordan?
4. WARDRIVING OVERVIEW
Wardriving is not a complex hack. A hacker can workthrough the wireless security issues, and
wouldeasily understand most of them. Exploiting the wireless networks requires simply a moving
vehicle, a portable device equipped with an 802.11 wireless LAN adapter (see figure 1).
NetStumbler is the most favored utility among the entire available ones. In light of that, this
research will mainly concentrate on the use of NetStumbler. In addition, nearly allWiFi enabled
Windows devices can blindly scan for hotspots by running NetStumbler[23].
It is not always that someone has to do anything deliberately to connect to someone else's
network. Some client adapters will hook up with any WAP (Wireless access points) that is non-
WEP (Wired Equivalent Privacy), within range, given enough time to perform a DHCP (Dynamic
Host Configuration Protocol)transaction. NetStumbler is Windows application that scans for
wireless networks and generates the information about the network such as SSID, encryption
status. In addition, NetStumblercan provide GPS coordinates[12, 23].However, in legitimate
operation, NetStumbleris mainly assigned Rogue AP detection[13]. It only monitors theparts of
data that the AP makes public. It has no means for reverse-engineering passwords, sniffing
packets, or connecting to a network (protected or otherwise). Client adapters can be configured
auto-connect to an AP once detected.TheStumbler program does not log any stations with SSIDs
other than onessensed by the omnidirectional antenna.
4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
46
Figure 1: Wardriving Diagram
4.1 Wireless Local Area Networks Security Issues
The first launches implementations of wireless technology were very slow, offering only about 1
to 2 Mbps (Megabits per second) speeds for transmission and suffered from lack of reliability and
week security, so it did not succeed well in the market[3,8,14].Information security professionals
as well as researchers have declared WEP security algorithm to be inappropriate for securing
wireless communication [4,12,15-16].WLAN depends on cryptographic methods to enable
security. In this research, WEPand WLAN security mechanisms assumed to be providing the
security as defined by IEEE 802.11 Standards [17]. WEP was the leading protocol developed for
Wi-Fi to provide encryption mechanism that should enable privacy through the means of user’s
authentication. However, it is a publically known fact that WEP was not able to secure the
wireless networks. WPA was suggested by the Wi-Fi Alliance to replace WEP as a new
cryptographic protocol. In addition, WLAN suffered from a number of security vulnerabilities,
where the seriousness of them was acknowledgedvery late[18].
Using NetStumbler, the tool sends out Probe Requests with pseudo random data included in its
request and listens for the response from the access point. The war-driving program then captures
the response and then displays the details of the packet for the user’s information. The 802.11
header includes information about the network encryption status as well as the SSID. Therefore,
this information can be collected by a war-driving program like NetStumbler(see figure 2). In
certain ways, information systems breachshares similar concepts with fingerprints [19].Thus, for
security and privacy reasons, all actual monitoring data was deleted from figure 2, and only the
user interface is being displayed.
5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
47
Figure 2: NetStumbleruser interface
5. TEST SETUP AND FINDINGS
To answer the research question, a test was conducted to collect data about existing wireless
networks in different Jordanian areas. The tests were simply conducted using a moving vehicle, a
laptop equipped with an 802.11 wireless LAN adapter, using NetStumbler as a tool to its request
and listens for the response from the access point. The driving was done in two major cities in
Jordan; Amman and Irbid. During the test: 1) Thecontents the tested network was not examined
or accessed.2) No attemptswere made to effectthe integrity of any system by altering, adding,
modifying, or deleting anything on any network, and 3) No actual use the network's was made to
connect to the Internet or surf the Web or anything similar activities. The process used to test the
networks does not constitute "access" of the company's network (what we did constitutes to the
State v. Allen case that took place in an Americancourt of law, which is frequently referred
towhen there is a questionregarding an illegal networkaccess [18].
Table 1: Network vulnerability
Type of Networks Number of Tested Networks Type Average
Vulnerable Network 132 79.52%
Protected Network 34 20.48%
Total 166 100.00%
The outcomes of this test reveal that there exist insecure wireless networks in people’s homes and
in small, medium and large corporationsas well. Because of these insecure deployments,
penetration test was conducted to determine the security status on some organizations’ wireless
6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
48
network, as well as home users’ systems, to determine if companies and users have deployed
their wireless network in a secure fashion. As for the first research question, the majority of the
tested wireless networks (79.52%) are unsecured and the security of the networks needs to be
further enhanced to protect those networks. The results of the evaluations are displayed in table 1
and figure 3.
Figure 3: Network vulnerability
As for the current approaches used for protecting wireless network and preventing unauthorized
users to access the network, 68.67% of the networks are found to be using low level protection,
and 11.45% are not applying any encryption (see table 2 and figure 4).
Table 2: Level Of protection
Type of Encryption Number of Tested Networks Type Average
Low Level Protection 114 68.67%
High Level Protection 33 19.88%
No Encryption 19 11.45%
Total 166 100.00%
Vulnerable Network
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
48
network, as well as home users’ systems, to determine if companies and users have deployed
their wireless network in a secure fashion. As for the first research question, the majority of the
tested wireless networks (79.52%) are unsecured and the security of the networks needs to be
further enhanced to protect those networks. The results of the evaluations are displayed in table 1
and figure 3.
Figure 3: Network vulnerability
As for the current approaches used for protecting wireless network and preventing unauthorized
users to access the network, 68.67% of the networks are found to be using low level protection,
and 11.45% are not applying any encryption (see table 2 and figure 4).
Table 2: Level Of protection
Type of Encryption Number of Tested Networks Type Average
Low Level Protection 114 68.67%
High Level Protection 33 19.88%
No Encryption 19 11.45%
Total 166 100.00%
Vulnerable Network Protected Network
Type of Networks
Number of Tested
Networks
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
48
network, as well as home users’ systems, to determine if companies and users have deployed
their wireless network in a secure fashion. As for the first research question, the majority of the
tested wireless networks (79.52%) are unsecured and the security of the networks needs to be
further enhanced to protect those networks. The results of the evaluations are displayed in table 1
and figure 3.
Figure 3: Network vulnerability
As for the current approaches used for protecting wireless network and preventing unauthorized
users to access the network, 68.67% of the networks are found to be using low level protection,
and 11.45% are not applying any encryption (see table 2 and figure 4).
Table 2: Level Of protection
Type of Encryption Number of Tested Networks Type Average
Low Level Protection 114 68.67%
High Level Protection 33 19.88%
No Encryption 19 11.45%
Total 166 100.00%
Number of Tested
Networks
7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
49
Figure 4: Level Of protection
To improve the security of the wireless network, the SSID needs to be changed to a different
name than the default. We have discovered that 92.17% of the networks are using default SSID
(see table 3 and figure 5). As for the level of threats facing the wireless networks in Jordan, by
default all client devices receive SSID broadcasts from all WAPs that are within range. Being
able to receive the SSID, the SSID was broadcasted from all WAPs were tested, when attackers
have developed sophisticated and effective techniques to exploit wireless systems.
Table 3: SSID Configuration
SSID Number of Tested Networks Type Average
Default SSID 153 92.17%
Changed SSID 13 7.83%
Total 166 100.00%
Figure 5: SSID Configuration
Low Level
Protection
Type of Encryption
Default SSID
Type of Encryption
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
49
Figure 4: Level Of protection
To improve the security of the wireless network, the SSID needs to be changed to a different
name than the default. We have discovered that 92.17% of the networks are using default SSID
(see table 3 and figure 5). As for the level of threats facing the wireless networks in Jordan, by
default all client devices receive SSID broadcasts from all WAPs that are within range. Being
able to receive the SSID, the SSID was broadcasted from all WAPs were tested, when attackers
have developed sophisticated and effective techniques to exploit wireless systems.
Table 3: SSID Configuration
SSID Number of Tested Networks Type Average
Default SSID 153 92.17%
Changed SSID 13 7.83%
Total 166 100.00%
Figure 5: SSID Configuration
High Level
Protection
No Encryption
Type of Encryption
Number of Tested
Networks
Default SSID Changed SSID
Type of Encryption
Number of Tested
Networks
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
49
Figure 4: Level Of protection
To improve the security of the wireless network, the SSID needs to be changed to a different
name than the default. We have discovered that 92.17% of the networks are using default SSID
(see table 3 and figure 5). As for the level of threats facing the wireless networks in Jordan, by
default all client devices receive SSID broadcasts from all WAPs that are within range. Being
able to receive the SSID, the SSID was broadcasted from all WAPs were tested, when attackers
have developed sophisticated and effective techniques to exploit wireless systems.
Table 3: SSID Configuration
SSID Number of Tested Networks Type Average
Default SSID 153 92.17%
Changed SSID 13 7.83%
Total 166 100.00%
Figure 5: SSID Configuration
Number of Tested
Networks
Number of Tested
Networks
8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
50
6. RECOMMENDATIONSFOR SECURING WIRLESS SYSTEMS
With the growth of wireless communication and wireless networks, more advanced and effective
techniques were implemented to exploit the wireless communication systems of all types. Using
these tools allows an attacker to access the internal networks and client systems, and often it can
be used to bypass the deployed security defenses system like intrusion detection systems.In light
of that, there will be a need to have a periodic audit of the wireless networks, and to try and assess
the wireless networks, evaluate the systems’ vulnerabilities, and analyze the security risks
associated with it. In addition, there will be a need to continue monitoring the network to identify
rogue WAPs and signal leakage. In addition, frequent inspection and adjustment of WAPs is
recommended to minimize the damage that WAP physical security issues may cause. This will
provide good information on the security of the wireless network. Using suitable assessment
tools and techniques to identify and expose threats that wireless network may be faced with, and
then use the proper defensive responses to protect wireless network resources.
To protect wireless network from Wardriving and hackers in general, protecting measures must
be well planned and thoroughly maintained and updated. In order to prevent the security issues
reported in this study, when implementing the wireless network, a security evaluation and risk
analysis must be conducted thoroughly. Once the network is fully implemented and operational,
there will be a need to have a security policies specific to the use of the wireless network. In
addition, a security audit will be essential to help identify and prevent the system’s
vulnerabilities.
By default all client devices receive SSID broadcasts from all WAPs that are within range. One of
the recommend ways to ensuring that a system will not be exposed to wardrivers is to disable
SSID broadcasting by the WAPs.Although tools such as Kismet can still discover a non- SSID
broadcasting wireless network many would be intruders will however be disappointed by a lack
of SSID broadcasts. Therefore, once the wireless devices are installed and set to go, there will be
a need to change all the manufacturer default settings. These settings include administrator name
and password, network ID and name, methods of authentication, broadcastingsetting, the default
encryption methods and pre-shared keys, and the method used to connection to the network [21].
MAC Address filtering can also be applied to enhance security. MAC Address filtering can be
implemented to improve authentication of the wireless enabled device. When using MAC
Address filtering, a table is developed and a list of all permitted MAC Addresses can be entered
into the table, where the default setting would be to deny access to all unlistedwireless systems.
Access to the wireless network must be controlledusing access point authentication, and all traffic
transmitted through the wireless networks should be first encrypted using one of the strong and
advanced methods of encryption like WPA2. If a default encryption is Wired Equivalent
Protection (WEP) then the default 40-bit key is used. WEP is broadly publicized for a number of
weaknesses, one of which is the key size. Therefore there will be a need to use 128-bit encryption
key to further strengthen the encryption. As a result,it will take significantly longer time for
intruders to crack.
To help reduce exposure, depending on the size of the network, the network can be subdivided
into several and smaller subnets. This will not only enhance the security of the system, but will
alsohelp delivergreater overall network performance as well as higher efficiency.We recommend
for those organizations that exemplified system weakness to conduct a network readiness
assessments to check for signal leakage from the internal wireless network to the publically
9. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
51
accessible areas, an also look for leakage from the publically accessible ad hoc wireless networks
into their network.
It seems that a good number of users are either not aware of the severe outcome of thepotential
security breaches, they may believe that their wireless connections are protected. Corporations
also underestimate the potential dangers. Therefore urgent action is needed in light of the recent
high-profile security breaches.Most threats come from the ignorance of users, the inactive
attitudes of corporations, and the improper implementation of security features by wireless
devices manufacturers.
7. CONCLUSION
The potential of wireless communications combined with high risk for unauthorized users to
access the computer networks, dictated the need for higher measures to be taken for
protectingsensitive information and insure the privacy of the user and protect theassets of the
company. However, it seems that a good number of users are either not aware of the severe
outcome of the potential security breaches, they may believe that their wireless connections are
protected. This was a clear indication by leaving factory default settings in some network devices.
Leavingthese network devices with the default setting will definitely permit other unauthorized
users to gains access to the systems.
In this research we evaluate the Wireless Network environment in Jordan in view of the use of the
WLAN equipment and found that a high percent of WLAN are not secured, the research also
provides some recommendations and best practices regarding the security of WLAN networks.
REFERENCES
[1] Loo, A. W. (2010), "Illusion of Wireless Security", Advances in Computers, Volume 79, 2010, Pages 119-167.
[2] Bulbul, H. I., Batmaz, I., and Ozel, M. (2008). "Wireless network security: comparison of WEP (Wired
Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security
protocols". First international conference on Forensic applications and techniques in telecommunications,
information, and multimedia and workshop(e-Forensics '08), ICST, Brussels, Belgium, Belgium, Article 9, 6
pages.
[3] Miller, B., and Hamilton, B. (2002). "Issues in Wireless Security (WEP, WPA & 802.11i)". The 18th Annual
Computer Security Applications Conference, 11 December 2002.
[4] Welch, D. J., and Sayles, A. (2010). "A Survey of 802.11a Wireless Security Threats and Security
Mechanisms",A Technical Report to the Army G6, Internet Technology and Secured Transactions (ICITST).
[5] Zadig, Sean M., and Tejay, G. (2010). "Securing IS assets through hacker deterrence: A case study", In the
proceedings of conference on Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit-eCrime,
pp. 1-7, 2010.
[6] Amouzegar, H., Jafar, M. T, and Hidaji, A. N. (2009). "A New SOA Security Model to Protect Against Web
Competitive Intelligence Attacks by Software Agents". International Journal of Information Security and
Privacy, pp. 18-28.
[7] Balfanz, D., Durfee, G., Grinter, R. E., Smetters, D. K. and Stewart, P. (2004). "Network-in-a-Box: How to set
up a secure wireless network in under a minute". In Proceedings of the 13th conference on USENIX Security
Symposium - Volume 13 (SSYM'04), USENIX Association, Berkeley, CA, USA, pp. 15-15.
[8] Ho, J. T., Dearman, D., Truong, K. N. (2010). "Improving Users’ Security Choices on Home Wireless
Networks"ACM, Article 12, 12 pages. DOI=10.1145/1837110.1837126. [online]. Available:
http://doi.acm.org/10.1145/1837110.1837126
[9] Hurley, C., Rogers, R., Thornton, F., and Connelly, D. (2007). WarDriving and Wireless Penetration Testing,
Syngress Publishing.
10. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
52
[10] Grinter, R. E., Edwards, W. K., Newman, Mark W., and Ducheneaut, N. (2005)."The work to make a home
network work".Ninth conference on European Conference on Computer Supported Cooperative Work, p.469-
488, September 18-22, 2005, Paris, France.
[11] Vladimirov, A., Gavrilenko, K. V., Mikhailovsky, A. (2004). Wifoo: The Secrets of Wireless Hacking. –
Addison Wesley.
[12] Borisov, N., Goldberg, I., and Wagner, D. (2008). "Security of the WEP Algorithm, UC Berkeley". [online].
Available: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html.
[13] Fluhrer, S., Mantin, I., and Shamir, A. (2001). "Weaknesses in the key scheduling algorithm of RC4". Lecture
Notes in Computer Science, vol. 2259, pp. 1-24. [online]. Available: http://www.crypto.com/papers/others/rc4
ksaproc.pdf.
[14] Berghel, H. (2004). "Wireless Infidelity I: Wardriving", Communications of the ACM – CACM, Vol. 47, no. 9,
pp.2.
[15] Burell, J. (2002)." Wireless Local Area Networking: Security Assessment and Countermeasures: IEEE 802.11
Wireless Networks".[Online].[online]. Available:telecom.gmu.edu/publications/Jim-Burrell-December-2002.pdf.
[16] Burell, J. (2002). "Wireless Local Area Networking: Security Assessment and Countermeasures: IEEE 802.11
Wireless Networks". [online]. Available: telecom.gmu.edu/publications/Jim-Burrell-December-2002.pdf.
[17] IEEE Standards Association. Std 802.11, 1999, Edition (R2003), 2003. [online]. Available:
http://standards.ieee.org/getieee802/download/802.11-1999.pdf.
[18] Thomas, M. (2004). "Network Security First-Step".Cisco Press, Indiana, USA. ISBN: 1-58720-099-6. p315.
[19] Cisco Networking Academy Program (2004). Fundamentals of Wireless LANs. Indianapolis, Indiana: Cisco
Press.
[20] Ryan, P. (2004). "War, Peace, or Stalemate: Wargames, Wardialing, Wardriving, and the Emerging Market for
Hacker Ethics". Virginia Journal of Law & Technology vol. 9. No.(7).
[21] TechDoc (2008). Securing Business against War Driving. [online].
Available:http://webupon.com/security/securing-business-against-war-driving.
[22] Etter, A. (2002). "A Guide to Wardriving and Detecting Wardrivers". SANS Institute, document number GSEC
Version: 1.4b.
[23] Martin, J. (2005).The Art of casual WiFi hacking. [online].
Available:www.infosecwriter.com/pdf/WiFi%20hacking%20article.pdf.
[24] Verizon (2010). Data Breach Investigations Report. "A study conducted by the Verizon Business RISK team in
cooperation with the United States Secret Service".
[25] Taylor, A. S. and Swan, L., (2005). "Artful systems in the home". In Proceedings of the SIGCHI conference on
Human factors in computing systems (CHI '05). ACM, New York, NY, USA, 641-650.
DOI=10.1145/1054972.1055060 http://doi.acm.org/10.1145/1054972.1055060.
[26] Office of the Privacy Commissioner of Canada, (2007, September 24). "Report of an Investigation into the
Security, Collection and Retention of Personal Information, TJX Companies Inc./Winners Merchant
International L.P". [Online]. Available:
http://www.oipc.ab.ca/ims/client/upload/Investigation%20Report%20P2007_IR_0061. Pdf.
AUTHORS BIO
Dr. Ahmad Mashhourearned his PhD in Information Systems from University of London (LSE), UK,
1989. He is currently an associate professor at the University of Bahrain, Information System Dept. He
also joined other universities in the middle East for some time including University of Qatar, and
YarmoukUniversity of Jordan. His research interest includes Simulation modeling and Analysis, e-
business and e-learning.
Email Address: mashhour_ahmad@yahoo.com
Dr. ZakariaSaleh is an AssociateProfessor at the MIS department, Yarnouk University. Before joining the Yarmouk
University faculty team, Dr. Saleh was an engineer in the automotive industry, where he worked on the design and
development of electronic control systems for Constructions and Agricultural Equipment, and he led the design and
development of web based Fleet Management System, which was successfully launched by Case Corporation of the US
in the year 2001.