Weaknesses and Strengths Analysis over Wireless Network Security Standards
نویسنده
چکیده
Several wireless networks security standards have been proposed and widely implemented in both business and home environments in order to protect the network from unauthorized access. However, the implementation of such standards is usually achieved by network administrators without even knowing the standards’ weaknesses and strengths. The intention of this paper is to evaluate and analyze the impact over the network’s security due to the implementation of the wireless networks security standards WEP, WPA and WLAN 802.1X. Keywords—802.1X; Vulnerabilities Analysis, WEP; Wireless Security; WPA.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملMobile and Wireless Communications Security
This article presents an overview of security issues for mobile and wireless communications. It describes the security requirements and architectural options for these networks. Subsequently three technologies are discussed in more detail: mobile phones (GSM and 3GSM), Wireless LAN (IEEE 802.11) and Personal Area Networks (Bluetooth). A critical evaluation is given of the strengths and weakness...
متن کاملA Collaborative Security: A Survey and Taxonomy
Security is oftentimes centrally managed. An alternative trend of using collaboration in order to improve security has gained momentum over the past few years. Collaborative security is an abstract concept that applies to a wide variety of systems, and has been used to solve security issues inherent in distributed environments. Thus far, collaboration has been used in many domains such as intru...
متن کاملEvaluating the Present Situation and Suggesting Appropriate Strategies forImproving the Efficiency of Pistachio Distribution Channels of Kerman Province Using SWOT Model
This study attempted to assess the situation of Iranian pistachio and its export distribution channels. The main purposes of this study were to determine the most important strengths, weaknesses, threats and opportunities facing the distribution channels of export of pistachio in Kerman province and to suggest appropriate strategies for the current situation. For this purpose, an experimental a...
متن کاملAn Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them revea...
متن کامل