Weaknesses and Strengths Analysis over Wireless Network Security Standards

نویسنده

  • Daniel Padilla
چکیده

Several wireless networks security standards have been proposed and widely implemented in both business and home environments in order to protect the network from unauthorized access. However, the implementation of such standards is usually achieved by network administrators without even knowing the standards’ weaknesses and strengths. The intention of this paper is to evaluate and analyze the impact over the network’s security due to the implementation of the wireless networks security standards WEP, WPA and WLAN 802.1X. Keywords—802.1X; Vulnerabilities Analysis, WEP; Wireless Security; WPA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Mobile and Wireless Communications Security

This article presents an overview of security issues for mobile and wireless communications. It describes the security requirements and architectural options for these networks. Subsequently three technologies are discussed in more detail: mobile phones (GSM and 3GSM), Wireless LAN (IEEE 802.11) and Personal Area Networks (Bluetooth). A critical evaluation is given of the strengths and weakness...

متن کامل

A Collaborative Security: A Survey and Taxonomy

Security is oftentimes centrally managed. An alternative trend of using collaboration in order to improve security has gained momentum over the past few years. Collaborative security is an abstract concept that applies to a wide variety of systems, and has been used to solve security issues inherent in distributed environments. Thus far, collaboration has been used in many domains such as intru...

متن کامل

Evaluating the Present Situation and Suggesting Appropriate Strategies forImproving the Efficiency of Pistachio Distribution Channels of Kerman Province Using SWOT Model

This study attempted to assess the situation of Iranian pistachio and its export distribution channels. The main purposes of this study were to determine the most important strengths, weaknesses, threats and opportunities facing the distribution channels of export of pistachio in Kerman province and to suggest appropriate strategies for the current situation. For this purpose, an experimental a...

متن کامل

An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks

More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them revea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012