International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...IDES Editor
With the widespread use of wireless networks,
securing Data transmission becomes a basic requirement. The
IEEE 802.11 standard which defines wireless networks
communication, has proposed in its second version, IEEE
802.11b, a new protocol to offer some wired-like security
services, such as: data privacy, data integrity, and
authentication. In this paper, we analyze Wired Equivalent
Privacy(WEP) security holes and we propose an improvement
over WEP which achieves, in addition to its security goals,
another security service which is replay detection.
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...CSCJournals
WLAN (Wireless Local Area Networks) are gaining their grounds, and widely deployed in organizations, college campuses, public places, and residential areas. This growing popularity of WLAN makes these networks more vulnerable towards attacks and data thefts. Attacker attempts unauthorized access to the network for accessing the sensitive data of the users. Thus, it's necessary to address all the security challenges and its countermeasures using various encryption algorithms to prevent the attacks. However, with the use of security protocols the performance of the WLAN network can be varied. Thus this paper addresses the impact of various security protocols on the WLAN network, keeping throughput as the benchmark for network performance.
IEEE 802.11 ac is the latest wireless standard that operates in 5 Ghz frequency band with higher data rate, compare to its previous standards. This research has also chosen IEEE 802.11 ac standard for investigating the impact of security protocols including WEP (Wired Equivalent Privacy), WPA (WiFi Protected Access), and WPA2 (WiFi Protected Access 2) on throughput of WLAN IEEE 802.11 ac in Windows environment using TCP and UDP traffic for both IP versions (IPv4 & IPv6). The research was launched in a real test-bed setup, with a Client/Server network structure. The results from the experiment showed that the performance of data throughput in the open system were higher comparable to secured systems. However, the results demonstrated that the performance of throughput have different behavior to different security protocols under TCP/UDP traffic with IPV4 & IPV6. A detailed comparison of results in all scenarios is explained in the paper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
A network which connects a bunch of distributed low-power sensor nodes together, with each node dedicated to a predefined operation can be visualized as a Wireless Sensor Network (WSN).
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...IDES Editor
With the widespread use of wireless networks,
securing Data transmission becomes a basic requirement. The
IEEE 802.11 standard which defines wireless networks
communication, has proposed in its second version, IEEE
802.11b, a new protocol to offer some wired-like security
services, such as: data privacy, data integrity, and
authentication. In this paper, we analyze Wired Equivalent
Privacy(WEP) security holes and we propose an improvement
over WEP which achieves, in addition to its security goals,
another security service which is replay detection.
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...CSCJournals
WLAN (Wireless Local Area Networks) are gaining their grounds, and widely deployed in organizations, college campuses, public places, and residential areas. This growing popularity of WLAN makes these networks more vulnerable towards attacks and data thefts. Attacker attempts unauthorized access to the network for accessing the sensitive data of the users. Thus, it's necessary to address all the security challenges and its countermeasures using various encryption algorithms to prevent the attacks. However, with the use of security protocols the performance of the WLAN network can be varied. Thus this paper addresses the impact of various security protocols on the WLAN network, keeping throughput as the benchmark for network performance.
IEEE 802.11 ac is the latest wireless standard that operates in 5 Ghz frequency band with higher data rate, compare to its previous standards. This research has also chosen IEEE 802.11 ac standard for investigating the impact of security protocols including WEP (Wired Equivalent Privacy), WPA (WiFi Protected Access), and WPA2 (WiFi Protected Access 2) on throughput of WLAN IEEE 802.11 ac in Windows environment using TCP and UDP traffic for both IP versions (IPv4 & IPv6). The research was launched in a real test-bed setup, with a Client/Server network structure. The results from the experiment showed that the performance of data throughput in the open system were higher comparable to secured systems. However, the results demonstrated that the performance of throughput have different behavior to different security protocols under TCP/UDP traffic with IPV4 & IPV6. A detailed comparison of results in all scenarios is explained in the paper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
A network which connects a bunch of distributed low-power sensor nodes together, with each node dedicated to a predefined operation can be visualized as a Wireless Sensor Network (WSN).
A presentation which on Wireless Network Security. It contains Introduction to wireless networking, security threats and risks, best practices on using wireless networks.
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EEIJCI JOURNAL
ZigBee is one of the most widely used wireless comm
unication technologies. ZigBee is being widely used
for sensor communications and many other research f
ields. Why consider ZigBee? Because it is cheap and
has better compatibility when compared to other com
munication technologies. We have given a detailed
description on comparison between all the available
technologies. In this paper, we have discussed so
me
basic concepts about ZigBee and its security aspect
s in networking. We have also listed out the major
manufacturers who are into the production of the tr
ansceivers for ZigBee
When setting up and maintaining Wi-Fi home networks, consider these tips for maximizing the security of the computers and data on these networks.
Securing Wireless Networks by maximizing the security of 802.11 standard and minimizing the Risk on Wireless network
Sustainable Lightweight Wireless Communication StackIJERA Editor
A light weight wireless communication stack based on wireless communication establishment. It handles data received over the air and send serially with security checking and acknowledgement. Also it transmits data over the air which is received serially with security checking and acknowledgement. It gives status of alive routers on coordinator’s UART port.
Seminar Paper on Security Issues of 802.11b based on IEEE Whitepaper by Boland, H. and Mousavi, H., Carleton University, Ottawa, Ont., Canada, IEEE Canadian Conference on Electrical and Computer Engineering, 2-5 May 2004
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A presentation which on Wireless Network Security. It contains Introduction to wireless networking, security threats and risks, best practices on using wireless networks.
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EEIJCI JOURNAL
ZigBee is one of the most widely used wireless comm
unication technologies. ZigBee is being widely used
for sensor communications and many other research f
ields. Why consider ZigBee? Because it is cheap and
has better compatibility when compared to other com
munication technologies. We have given a detailed
description on comparison between all the available
technologies. In this paper, we have discussed so
me
basic concepts about ZigBee and its security aspect
s in networking. We have also listed out the major
manufacturers who are into the production of the tr
ansceivers for ZigBee
When setting up and maintaining Wi-Fi home networks, consider these tips for maximizing the security of the computers and data on these networks.
Securing Wireless Networks by maximizing the security of 802.11 standard and minimizing the Risk on Wireless network
Sustainable Lightweight Wireless Communication StackIJERA Editor
A light weight wireless communication stack based on wireless communication establishment. It handles data received over the air and send serially with security checking and acknowledgement. Also it transmits data over the air which is received serially with security checking and acknowledgement. It gives status of alive routers on coordinator’s UART port.
Seminar Paper on Security Issues of 802.11b based on IEEE Whitepaper by Boland, H. and Mousavi, H., Carleton University, Ottawa, Ont., Canada, IEEE Canadian Conference on Electrical and Computer Engineering, 2-5 May 2004
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
1. K. Prasuna et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.146-148
RESEARCH ARTICLE
www.ijera.com
OPEN ACCESS
Secure Level Transmission in Wi-Fi Using Cryptography
K. Prasuna1, M. Padmaja2
1
2
Asst.Professor, Vijaya Institute of Technology for Women, Enikepadu, INDIA.
Associate Professor,VR Siddhartha College of Engineering, INDIA
Abstract
Wi-Fi, is a mechanism that allows electronic devices to exchange data wirelessly over a computer network WiFi suggests Wireless Fidelity, resembling the long-established audio-equipment classification term Hi-Fi or
High Fidelity.This paper first gives some background information about WiFi system and security issues in ad
hoc networks, then it concentrates on the specific security measures like hybrid encryption techniques using
both AES and RSA algorithms and also the different standards. To provide the security for the data transmitted
through WiFi ,it uses WEP algorithm,WEP64 and WEP128 and then it moves to WPA (Wi-Fi Protected
Access) as the key is short in WEP.WPA use the TKIP and depends on RC4,which consist of 128 bit and 48 bit.
The security comparisons show that WPA and TPIK is more advantageous than WEP and hence it is more
preferable.
Keywords-Wi-Fi, WEP, WPA, TPIK
I.
INTRODUCTION
Wi-Fi is a wireless technology that uses
radio frequency to transmit data through the air. In
Short called wireless fidelity and is meant to be used
generically when referring to any type of 802.11
network, whether 802.11b, 802.11a, 802.11g, dualband, etc.The 802.11 standard reserves the low levels
of the OSI model for a wireless connection that uses
electromagnetic waves.The physical layer , which
offers three types of information encoding. The data
link layer, comprised of two sub-layers:
Logical Link Control (or LLC) and Media
Access Control (or MAC). The physical layer defines
the radio wave modulation and signaling
characteristics for data transmission, while the data
link layer defines the interface between the machine's
bus and the physical layer, in particular an access
method close to the one used in the Ethernet standard
and rules for communication between the stations of
the network. The 802.11 standard actually has three
physical layers, which define alternative modes of
transmission:
Data Link Layer
Physical Layer
802.2
DSSS
802.11
FHSS,Infrared
II.
THE VARIOUS WI-FI STANDARDS
The IEEE 802.11 standard is actually only
the earliest standard, allowing 1-2 Mbps of
bandwidth. Amendments have be made to the original
standard in order to optimise bandwidth (these
include the 802.11a, 802.11b and 802.11g standards,
which are called 802.11 physical standards) or to
better specify components in order to ensure
improved security or compatibility. the various
www.ijera.com
amendments to the 802.11 standard and their
significance are given as
802.11a-Wifi5 :The 802.11a standard (called WiFi
5) allows higher bandwidth (54 Mbps maximum
throughput, 30 Mbps in practice). The 802.11a
standard provides 8 radio channels in the 5 GHz
frequency band.
802.11b-WiFi:The 802.11b standard is currently the
most widely used one. It offers a maximum
thoroughput of 11 Mbps (6 Mbps in practice) and a
reach of up to 300 metres in an open environment. It
uses the 2.4 GHz frequency range, with 3 radio
channels available.
802.11c-Bridging 802.11 and 802.1d:The 802.11c
bridging standard is of no interest to the general
public. It is only an amended version of the 802.1d
standard that lets 802.1d bridge with 802.11compatible devices (on the data link level).
802.11d-Internationalisation:The 802.11d standard
is a supplement to the 802.11 standard which is meant
to allow international use of local 802.11 networks. It
lets different devices trade information on frequency
ranges depending on what is permitted in the country
where the device is from.
802.11e-Improving service quality:The 802.11e
standard is meant to improve the quality of service at
the level of the data link layer. The standard's goal is
to define the requirements of different packets in
terms of bandwidth and transmission delay so as to
allow better transmission of voice and video.
802.11f-Roaming:The 802.11f is a recommendation
for access point vendors that allows products to be
more compatible. It uses the Inter-Access Point
Roaming Protocol, which lets a roaming user
transparently switch from one access point to another
while moving around, no matter what brands of
146 | P a g e
2. K. Prasuna et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.146-148
access points are used on the network infrastructure.
This ability is also simply called roaming.
802.11g:The 802.11g standard offers high bandwidth
(54 Mbps maximum throughput, 30 Mbps in practice)
on the 2.4 GHz frequency range. The 802.11g
standard is backwards-compatible with the 802.11b
standard, meaning that devices that support the
802.11g standard can also work with 802.11b.
802.11h:The 802.11h standard is intended to bring
together the 802.11 standard and the European
standard (HiperLAN 2, hence the h in 802.11h) while
conforming to European regulations related to
frequency use and energy efficiency.
802.11i:The 802.11i standard is meant to improve the
security of data transfers (by managing and
distributing keys, and implementing encryption and
authentication). This standard is based on the AES
(Advanced Encryption Standard) and can encrypt
transmissions that run on 802.11a, 802.11b and
802.11g technologies.
802.11Ir:The 802.11r stadard has been elaborated so
that it may use infra-red signals. This standard has
become technologically obsolete.
802.11j:The 802.11j standard is to Japanese
regulation what the 802.11h is to European
regulation.
The 802.11a, 802.11b and 802.11g standards, called
"physical standards" are amendments to the 802.11
standard and offer different modes of operation,
which lets them reach different data transfer speeds.
III.
WEP
WEP known as Wired Equivalent
Privacy.The main goal of WEP is to make Wi-Fi
network at least as secure as wired LANand to encrpt
data transmitted to prevent the attackers from getting
the information.WEP offers services such as message
confidentiality,message integrity and authencity and
access control to the network.
WEP uses encryption algorithm called
RC4.The key divided into two parts:IV(InitialVector)
of 24 bits and Secret key of 40 bitsor 104 bits.There
are two kinds of WEP-WEP64(40bit+24bit) and WEP
128(104bit+24bit).
This key is all-important to WEP in that it is
also used in the encryption process to uniquely
scramble each packet of information with a unique
password. This ensures that if a hacker cracks one
packets key,he won’t be able to view every packet’s
information.WEP defines a method to create a unique
secret key for each packet using the 5- or 13characters of the pre-shared key and three more
psuedo-randomly selected characters picked by the
wireless hardware.
RC4 Algorithm
RC4 is the encryption algorithm used to
cipher the data sent over the airwaves. It is important
that data is scrambled; otherwise, anyone could “see”
everything using a sniffer. This includes all e-mails,
www.ijera.com
www.ijera.com
Web pages, documents, and more. RC4 is a very
simple and fast method of encryption that scrambles
each and every byte of data sent in a packet.It does
this through a series of equations using the previously
discussed secret key.RC4 actually consists of two
parts: the Key Scheduling Algorithm and the Psuedo
Random Generation Algorithm. Each part is
responsible for a different part of the encryption
process.
KSA (Key Scheduling Algorithm)
The Key Scheduling Algorithm is the first
part of the encryption process. The following is
the algorithm actually used in RC4.
1. Assume N = 256
2. K[] = Secrete Key array
3. Initialization:
4. For i = 0 to N – 1
5. S[i] = i
6. j = 0
7. Scrambling:
8. For i = 0 ... N – 1
9. j = j + S[i] + K[i]
10. Swap(S[i], S[j])
PRGA
The PRGA (Psuedo Random Generation
Algorithm) is the part of the RC4 process that outputs
a streaming key based on the KSA’s psuedo random
state array. This streaming key is then merged with
the plaintext data to create a stream of data that is
encrypted.
1. Initialization:
2. i = 0
3. j = 0
4. Generation Loop:
5. i = i + 1
6. j = j + S[i]
7. Swap(S[i], S[j])
8. Output z = S[S[i] + S[j]]
9. Output XORed with data
The reason of transition to WPA.The same IV can be
used more than once.The secret key is common in
WEP.The key that WEP uses is short.Most users
usually do not change their keys.
WPA:WPA known as Wi-Fi Protected Access.WPA
use the TKIP and depends on RC4.The key in WPA
consist of 128 bit and 48 bit for initial vector
TKIP:TKIP is a security protocol used in the IEEE
802.11 wireless networking standard.TKIP was a
solution to replace WEP without requiring the
replacement of legacy hardware..TKIP implement
three new security features.TKIP implements a key
mixing function.WPA implements a sequence counter
to protect against replay attacks.Finally ,TKIP
implements a 64-bit message integrity check named
MICHAEL
147 | P a g e
3. K. Prasuna et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.146-148
Encryption
Key rotation
Key
distribution
WEP
RC4
None
Manually
typed
into each
device
IV.
WPA
RC4
Dynamic
sessionke
ys
Automati
c
distributi
on
WPA2
AES
Dynamic
sessionkeys
Automatic
distribution
CONCLUSIONS
[8]
[9]
[10]
[11]
www.ijera.com
Vebjørn Moen, H°avard Raddum, Kjell J.
Hole, “Weaknesses in theTemporal Key
Hash of WPA”, University of Bergen,2005
Arunesh Mishra, William, A. Arbaugh, “An
Initial Security Analysisof the IEEE 802.1X
Standard”, University of Meryland, 2002
Vebjørn Moen, H°avard Raddum, Kjell J.
Hole; “Weaknesses in theTemporal Key
Hash of WPA”; Mobile Computing
andCommunications Review, 2005
John L. MacMichael; “Auditing Wi-Fi
Protected Access (WPA)Pre-Shared Key
Mode”; Linux Journal, 2005.
As discussed above, security is not one time
job. Security is constant vigilance against threats and
attacks. We cannot eliminate hackers, pirates, thieves,
etc. from the face of the earth. WPA (Wi-Fi
Protected Access) is the next generation of wireless
encryption technologies. It’s far more secure and
easier to configure than WEP. Almost all network
devices support this. WPA replaces WEP with an
improved encryption algorithm called Temporal Key
Integrity Protocol (TKIP). TKIP supplies each client
with a unique key and uses much longer keys that are
rotated at a configurable interval. WPA also includes
an encrypted message integrity check field in the
packet to prevent denial-of-service and spoofing
attacks, something that neither static for security. It
can be used in Personal or Enterprise modes and has
so far proven difficult to attack. It is recommended to
use WPA or WPA2 encryption.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Arash Habibi Lashkari, F. Towhidi, R. S.
Hoseini, “Wired EquivalentPrivacy(WEP)”,
ICFCC
Kuala
Lumpur
Conference,
Published byIEEE Computer Society,
Indexed by THAMSON ISI, 2009
Donggang Liu, P. N., “Security for Wireless
Sensor Networks”,Springer., November,
2006
Garcia, R. H. a. M., “AN ANALYSIS OF
WIRELESS SECURITY”,CCSC: South
Central Conference. 2006
Kempf, J., “Wireless Internet Security:
Architecture and Protocols“,Cambridge
University Press. October, 2008
Hani Ragab Hassan, Yacine Challal,
“Enhanced WEP: An efficientsolution to
WEP threats”, IEEE 2005
Halil Ibrahim BULBUL, Ihsan BATMAZ,
Mesut OZEL,“Comparison of WEP (Wired
Equivalent Privacy) Mechanism, WPA(WiFi Protected Access) and RSN (Robust
Security Network)Security Protocols”; eForensics January 2008, Adelaide ,Australia.
Gamal Selim, Hesham M. El Badawy,
Mohamed Abdul Salam,“NEW PROTOCOL
DESIGN
FOR
WIRELESS
NETWORKSSECURITY”, IEEE Explore
www.ijera.com
148 | P a g e