Anticipating WPS PIN Vulnerability to Secure Wireless Network
نویسندگان
چکیده
منابع مشابه
Secure Wireless Access to a Campus Network
This paper presents a twofold view of campus-wide wireless networks: Users and network managers. Providing an easy network experience to the user while keeping the wireless network secure and manageable is a key issue. This paper presents the description of the vendor-independent approach to a secure wireless local area network being implemented on this university campus. User configuration is ...
متن کاملSecure Aggregation for Wireless Network
An emerging class of important applications uses ad hoc wireless networks of low-power sensor devices to monitor and send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power, intermediate network nodes should aggregate results from individual sensors. However, this opens the risk that a single compromised sensor device can ...
متن کاملIs Your Wireless Network Secure?
The use of wireless technology has become increasingly popular due to its flexibility and recent affordabili ty over traditional methods to access hard-wired LANs. This convenience, however, may not be worth the potential for losses incurred by its use. The 802.11b standard has been coming under increased scrutiny in light of a recently published paper outlining a significant vulnerability foun...
متن کاملAnticipating Cyber Vulnerability Exploits Using Machine Learning
| @RecordedFuture Every day about 20 new cyber vulnerabilities are released and reported, and these are related to various software implementation weaknesses. Hackers exploit these vulnerabilities to launch an attack, trigger a system failure, access sensitive information, or gain remote system access. Some vulnerabilities have a severe impact, while hackers show little or no interest in exploi...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ComTech: Computer, Mathematics and Engineering Applications
سال: 2013
ISSN: 2476-907X,2087-1244
DOI: 10.21512/comtech.v4i2.2554