MDS-WLAN: Maximal Data Security in WLAN for Resisting Potential Threats
نویسندگان
چکیده
منابع مشابه
Practical WLAN Security
Syftet med det här arbetet har varit att utveckla en praktisk Man-In-The-Middle-attack mot trådlösa klienter på NetLogon-systemet vid Linköpings Universitet. Målsättningen har varit att attacken skall ske så transparent som möjligt ur offrets synvinkel. Attacken använder DNS-spoofing och en MITM-metod med förfalskade avsändaradresser genom packet injection. Vi har implementerat ett fungerande v...
متن کاملOverview of WLAN security
Wireless networks are on the cutting edge of modern technology and are fast becoming ubiquitous. As a result increasing interest surrounding possible security problems has arisen. This paper offers a general overview of various security schemes designed to protect wireless networks. For each respective scheme, advantages and disadvantages are examined.
متن کاملWLAN Security: Current and Future
Many companies, organizations, and even individuals implement wireless local area networks (WLANs) in various locations such as their offices, conference rooms, homes, and business areas. This type of connection offers users portability because they can move from one location to another while maintaining access to the corporate network, but it does not offer access between locations. Mobility, ...
متن کاملWLAN Security Issues and Solutions
Wireless network is widely used in many sectors due to ease of installation, flexibility, mobility, reduced cost-of-ownership, and scalability. WiFi network can be accessed with laptops, mobile phones, cameras, game consoles and many other increasing numbers of consumer electronic gadgets. Wireless Local Area Network (WLAN) technology has changed the way people communicate and share information...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2015
ISSN: 2088-8708,2088-8708
DOI: 10.11591/ijece.v5i4.pp859-868