SlideShare a Scribd company logo
CS958 WIRELESS SECURITY 
WIRELESS TECHNOLOGIES 
Introduction to wireless technologies- Wireless data networks-Personal Area Networks - 
Transmission Media – WLAN standards - Securing WLANS - Countermeasures - WEP (Wired 
Equivalence Protocol). 
WIRELESS THREATS 
Kinds of security breaches - Eavesdropping - Communication Jamming - RF interference - 
Covert wireless channels - DOS attack – Spoofing - Theft of services - Traffic Analysis - 
Cryptographic threats - Wireless security Standards. 
SECURITY IN DATA NETWORKS 
Wireless Device security issues - CDPD security (Cellular Digital Packet Data)-GPRS security 
(General Packet Radio Service) - GSM (Global System for Mobile Communication) security – 
IP security. 
WIRELESS TRANSPORT LAYER SECURITY 
Secure Socket Layer - Wireless Transport Layer Security - WAP Security Architecture - WAP 
Gateway. 
BLUETOOTH SECURITY 
Basic specifications – Piconets – Bluetooth security architecture – Scatternets – Security at the 
baseband layer and link layer – Frequency hopping – Security manager – Authentication – 
Encryption – Threats to Bluetooth security. 
Total 42 
REFERENCES 
1. Nichols and Lekka, “Wireless Security-Models, Threats and Solutions”, Tata McGraw – Hill, 
New Delhi, 2006. 
2. Merritt Maxim and David Pollino, ”Wireless Security”, Osborne/McGraw Hill, New Delhi, 
2005. 
3. William Stallings, “Cryptography and Network Security - Principles and practices, Prentice 
Hall, New Delhi, 2006.

More Related Content

What's hot

IoT4Devs (1)
IoT4Devs (1)IoT4Devs (1)
IoT4Devs (1)
Henri Cavalcante
 
Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc.
Shane Williams
 
JDMDE Specialisation KaHo Sint-Lieven
JDMDE Specialisation KaHo Sint-LievenJDMDE Specialisation KaHo Sint-Lieven
JDMDE Specialisation KaHo Sint-Lieven
KaHo Sint-Lieven
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
John Intindolo
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
Rebecca Jones
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
Ankit Gupta
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
VIKAS SINGH BHADOURIA
 
Cliq intro 2016
Cliq intro 2016Cliq intro 2016
Cliq intro 2016
Editor NHM
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
Defence and Security Accelerator
 
Wlan security
Wlan securityWlan security
Wlan security
Sajan Sahu
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
Chandrak Trivedi
 
Network Security
Network SecurityNetwork Security
Network Security
MUHAMMAD UMAIR
 
Powerpoint Chapter 16
Powerpoint Chapter 16Powerpoint Chapter 16
Powerpoint Chapter 16
Nur Farhani
 
R6E for Industry 4.0
R6E for Industry 4.0R6E for Industry 4.0
R6E for Industry 4.0
RADIO6ENSE Srl
 
CSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTsCSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTs
Anwar Mohamed
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
AirTight Networks
 
Presentation1
Presentation1Presentation1
Presentation1
Suvanna_missu
 
Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed Networks
Priyanka Aash
 

What's hot (18)

IoT4Devs (1)
IoT4Devs (1)IoT4Devs (1)
IoT4Devs (1)
 
Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc.
 
JDMDE Specialisation KaHo Sint-Lieven
JDMDE Specialisation KaHo Sint-LievenJDMDE Specialisation KaHo Sint-Lieven
JDMDE Specialisation KaHo Sint-Lieven
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Cliq intro 2016
Cliq intro 2016Cliq intro 2016
Cliq intro 2016
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Wlan security
Wlan securityWlan security
Wlan security
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Network Security
Network SecurityNetwork Security
Network Security
 
Powerpoint Chapter 16
Powerpoint Chapter 16Powerpoint Chapter 16
Powerpoint Chapter 16
 
R6E for Industry 4.0
R6E for Industry 4.0R6E for Industry 4.0
R6E for Industry 4.0
 
CSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTsCSCAMP2015 - Mobile Security in the age of APTs
CSCAMP2015 - Mobile Security in the age of APTs
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Presentation1
Presentation1Presentation1
Presentation1
 
Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed Networks
 

Viewers also liked

NET-CS-DEC-2010- PAPER-II
NET-CS-DEC-2010- PAPER-IINET-CS-DEC-2010- PAPER-II
NET-CS-DEC-2010- PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
Dss e education project
Dss e education projectDss e education project
Dss e education project
VIJAY TRIPATHI (DSS Basti)
 
VEHICULAR AD HOC NETWORKS
VEHICULAR AD HOC NETWORKSVEHICULAR AD HOC NETWORKS
VEHICULAR AD HOC NETWORKS
VIJAY TRIPATHI (DSS Basti)
 
AD HOC NETWORKS
AD HOC NETWORKSAD HOC NETWORKS
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
VIJAY TRIPATHI (DSS Basti)
 
NET-CS-JUNE-2012-PAPER-II
NET-CS-JUNE-2012-PAPER-IINET-CS-JUNE-2012-PAPER-II
NET-CS-JUNE-2012-PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
UGC Paper i (set-x) (1)
UGC Paper i (set-x) (1)UGC Paper i (set-x) (1)
UGC Paper i (set-x) (1)
Department Of Environment
 
UGC Paper i (set-y) (1)
UGC Paper i (set-y) (1)UGC Paper i (set-y) (1)
UGC Paper i (set-y) (1)
Department Of Environment
 
UGC Paper i (set-z) (1)
 UGC Paper i (set-z) (1) UGC Paper i (set-z) (1)
UGC Paper i (set-z) (1)
Department Of Environment
 

Viewers also liked (9)

NET-CS-DEC-2010- PAPER-II
NET-CS-DEC-2010- PAPER-IINET-CS-DEC-2010- PAPER-II
NET-CS-DEC-2010- PAPER-II
 
Dss e education project
Dss e education projectDss e education project
Dss e education project
 
VEHICULAR AD HOC NETWORKS
VEHICULAR AD HOC NETWORKSVEHICULAR AD HOC NETWORKS
VEHICULAR AD HOC NETWORKS
 
AD HOC NETWORKS
AD HOC NETWORKSAD HOC NETWORKS
AD HOC NETWORKS
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 
NET-CS-JUNE-2012-PAPER-II
NET-CS-JUNE-2012-PAPER-IINET-CS-JUNE-2012-PAPER-II
NET-CS-JUNE-2012-PAPER-II
 
UGC Paper i (set-x) (1)
UGC Paper i (set-x) (1)UGC Paper i (set-x) (1)
UGC Paper i (set-x) (1)
 
UGC Paper i (set-y) (1)
UGC Paper i (set-y) (1)UGC Paper i (set-y) (1)
UGC Paper i (set-y) (1)
 
UGC Paper i (set-z) (1)
 UGC Paper i (set-z) (1) UGC Paper i (set-z) (1)
UGC Paper i (set-z) (1)
 

Similar to Wireless Security

Diploma Content
Diploma ContentDiploma Content
Diploma Content
Osama Ashraf
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
IJCNCJournal
 
Cdma Security
Cdma SecurityCdma Security
Cdma Security
guestb2cc28
 
A high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applicationsA high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applications
ariannabenaja
 
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
Nune SrinivasRao
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
Kristen Carter
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
Wendy Berg
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
Sarath K Sukumar
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
Neethu Tressa
 
Telecommunications & network (ism)
Telecommunications & network (ism)Telecommunications & network (ism)
Telecommunications & network (ism)
Adria Vendrell
 
Wsn
WsnWsn
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Isam Shahrour
 
15
1515
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
Westermo Network Technologies
 
ISI Journals Paper Publication Guidance
ISI Journals Paper Publication GuidanceISI Journals Paper Publication Guidance
ISI Journals Paper Publication Guidance
Phdtopiccom
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
Phdtopiccom
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
ijwmn
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
SDMCET DHARWAD
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Future Generation of Mobile and Satellite Communication Technology
Future Generation of Mobile and Satellite Communication TechnologyFuture Generation of Mobile and Satellite Communication Technology
Future Generation of Mobile and Satellite Communication Technology
AIMST University
 

Similar to Wireless Security (20)

Diploma Content
Diploma ContentDiploma Content
Diploma Content
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
 
Cdma Security
Cdma SecurityCdma Security
Cdma Security
 
A high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applicationsA high level perspective on 5G technologies and applications
A high level perspective on 5G technologies and applications
 
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity materialwirelesssecurity material
wirelesssecurity materialwirelesssecurity materialwirelesssecurity material
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
 
6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions6G Security Challenges And Potential Solutions
6G Security Challenges And Potential Solutions
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
Telecommunications & network (ism)
Telecommunications & network (ism)Telecommunications & network (ism)
Telecommunications & network (ism)
 
Wsn
WsnWsn
Wsn
 
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
 
15
1515
15
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
ISI Journals Paper Publication Guidance
ISI Journals Paper Publication GuidanceISI Journals Paper Publication Guidance
ISI Journals Paper Publication Guidance
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Future Generation of Mobile and Satellite Communication Technology
Future Generation of Mobile and Satellite Communication TechnologyFuture Generation of Mobile and Satellite Communication Technology
Future Generation of Mobile and Satellite Communication Technology
 

More from VIJAY TRIPATHI (DSS Basti)

Presentation hotel
Presentation hotelPresentation hotel
Presentation hotel
VIJAY TRIPATHI (DSS Basti)
 
NET-CS-DEC-2012-PAPER-III
NET-CS-DEC-2012-PAPER-IIINET-CS-DEC-2012-PAPER-III
NET-CS-DEC-2012-PAPER-III
VIJAY TRIPATHI (DSS Basti)
 
NET-DEC-2012-CS-PAPER-II
NET-DEC-2012-CS-PAPER-IINET-DEC-2012-CS-PAPER-II
NET-DEC-2012-CS-PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
UGC-NET-DEC-2012-PAPER-I-SET-W
UGC-NET-DEC-2012-PAPER-I-SET-WUGC-NET-DEC-2012-PAPER-I-SET-W
UGC-NET-DEC-2012-PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
NET-CS-JUNE-2012-PAPER-III
NET-CS-JUNE-2012-PAPER-IIINET-CS-JUNE-2012-PAPER-III
NET-CS-JUNE-2012-PAPER-III
VIJAY TRIPATHI (DSS Basti)
 
UGC-NET-JUNE-2012-PAPER-I-SET-W
UGC-NET-JUNE-2012-PAPER-I-SET-WUGC-NET-JUNE-2012-PAPER-I-SET-W
UGC-NET-JUNE-2012-PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
UGC-NET-COMPUTER SCIENCE-JUNE-2011-PAPER-II
UGC-NET-COMPUTER SCIENCE-JUNE-2011-PAPER-IIUGC-NET-COMPUTER SCIENCE-JUNE-2011-PAPER-II
UGC-NET-COMPUTER SCIENCE-JUNE-2011-PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
UGC-NET-JUNE-2011-PAPER-I
UGC-NET-JUNE-2011-PAPER-IUGC-NET-JUNE-2011-PAPER-I
UGC-NET-JUNE-2011-PAPER-I
VIJAY TRIPATHI (DSS Basti)
 
NET-DEC-2010-PAPER-I-SET-W
NET-DEC-2010-PAPER-I-SET-WNET-DEC-2010-PAPER-I-SET-W
NET-DEC-2010-PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-IIUGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
UGC NET - JUNE-2010- PAPER-I-SET-W
UGC NET - JUNE-2010- PAPER-I-SET-WUGC NET - JUNE-2010- PAPER-I-SET-W
UGC NET - JUNE-2010- PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-IIUGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
UGC NET - DEC-2009- PAPER-I-SET-W
UGC NET - DEC-2009- PAPER-I-SET-WUGC NET - DEC-2009- PAPER-I-SET-W
UGC NET - DEC-2009- PAPER-I-SET-W
VIJAY TRIPATHI (DSS Basti)
 
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-IIUGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
VIJAY TRIPATHI (DSS Basti)
 
UGC NET June 2009 PAPER I Solved
UGC NET June 2009 PAPER I SolvedUGC NET June 2009 PAPER I Solved
UGC NET June 2009 PAPER I Solved
VIJAY TRIPATHI (DSS Basti)
 

More from VIJAY TRIPATHI (DSS Basti) (15)

Presentation hotel
Presentation hotelPresentation hotel
Presentation hotel
 
NET-CS-DEC-2012-PAPER-III
NET-CS-DEC-2012-PAPER-IIINET-CS-DEC-2012-PAPER-III
NET-CS-DEC-2012-PAPER-III
 
NET-DEC-2012-CS-PAPER-II
NET-DEC-2012-CS-PAPER-IINET-DEC-2012-CS-PAPER-II
NET-DEC-2012-CS-PAPER-II
 
UGC-NET-DEC-2012-PAPER-I-SET-W
UGC-NET-DEC-2012-PAPER-I-SET-WUGC-NET-DEC-2012-PAPER-I-SET-W
UGC-NET-DEC-2012-PAPER-I-SET-W
 
NET-CS-JUNE-2012-PAPER-III
NET-CS-JUNE-2012-PAPER-IIINET-CS-JUNE-2012-PAPER-III
NET-CS-JUNE-2012-PAPER-III
 
UGC-NET-JUNE-2012-PAPER-I-SET-W
UGC-NET-JUNE-2012-PAPER-I-SET-WUGC-NET-JUNE-2012-PAPER-I-SET-W
UGC-NET-JUNE-2012-PAPER-I-SET-W
 
UGC-NET-COMPUTER SCIENCE-JUNE-2011-PAPER-II
UGC-NET-COMPUTER SCIENCE-JUNE-2011-PAPER-IIUGC-NET-COMPUTER SCIENCE-JUNE-2011-PAPER-II
UGC-NET-COMPUTER SCIENCE-JUNE-2011-PAPER-II
 
UGC-NET-JUNE-2011-PAPER-I
UGC-NET-JUNE-2011-PAPER-IUGC-NET-JUNE-2011-PAPER-I
UGC-NET-JUNE-2011-PAPER-I
 
NET-DEC-2010-PAPER-I-SET-W
NET-DEC-2010-PAPER-I-SET-WNET-DEC-2010-PAPER-I-SET-W
NET-DEC-2010-PAPER-I-SET-W
 
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-IIUGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2010 PAPER-II
 
UGC NET - JUNE-2010- PAPER-I-SET-W
UGC NET - JUNE-2010- PAPER-I-SET-WUGC NET - JUNE-2010- PAPER-I-SET-W
UGC NET - JUNE-2010- PAPER-I-SET-W
 
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-IIUGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
UGC NET COMPUTER SCIENCE DEC- 2009 PAPER-II
 
UGC NET - DEC-2009- PAPER-I-SET-W
UGC NET - DEC-2009- PAPER-I-SET-WUGC NET - DEC-2009- PAPER-I-SET-W
UGC NET - DEC-2009- PAPER-I-SET-W
 
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-IIUGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
UGC NET COMPUTER SCIENCE JUNE 2009 PAPER-II
 
UGC NET June 2009 PAPER I Solved
UGC NET June 2009 PAPER I SolvedUGC NET June 2009 PAPER I Solved
UGC NET June 2009 PAPER I Solved
 

Recently uploaded

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 

Recently uploaded (20)

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 

Wireless Security

  • 1. CS958 WIRELESS SECURITY WIRELESS TECHNOLOGIES Introduction to wireless technologies- Wireless data networks-Personal Area Networks - Transmission Media – WLAN standards - Securing WLANS - Countermeasures - WEP (Wired Equivalence Protocol). WIRELESS THREATS Kinds of security breaches - Eavesdropping - Communication Jamming - RF interference - Covert wireless channels - DOS attack – Spoofing - Theft of services - Traffic Analysis - Cryptographic threats - Wireless security Standards. SECURITY IN DATA NETWORKS Wireless Device security issues - CDPD security (Cellular Digital Packet Data)-GPRS security (General Packet Radio Service) - GSM (Global System for Mobile Communication) security – IP security. WIRELESS TRANSPORT LAYER SECURITY Secure Socket Layer - Wireless Transport Layer Security - WAP Security Architecture - WAP Gateway. BLUETOOTH SECURITY Basic specifications – Piconets – Bluetooth security architecture – Scatternets – Security at the baseband layer and link layer – Frequency hopping – Security manager – Authentication – Encryption – Threats to Bluetooth security. Total 42 REFERENCES 1. Nichols and Lekka, “Wireless Security-Models, Threats and Solutions”, Tata McGraw – Hill, New Delhi, 2006. 2. Merritt Maxim and David Pollino, ”Wireless Security”, Osborne/McGraw Hill, New Delhi, 2005. 3. William Stallings, “Cryptography and Network Security - Principles and practices, Prentice Hall, New Delhi, 2006.