SlideShare a Scribd company logo
International Journal of Trend in
International Open Access Journal
ISSN No: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Attacks and Risks i
A. C.
Department of BCA & MSC.SS, Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India
ABSTRACT
Wireless networks are mostly common and are the
part of every organisation or an individual. In this
article we look into the technology of wireless
network and security features of WLANs, delinquent
and attacks in IEEE 802.11 WLANs. There are
variety of attack methods that can be used against the
uses of wireless networks. Modern wireless data
network use a variety of techniques to provide
obstacles to such attacks. This article also discuss the
risks of wireless security in an enterprise. We
conclude that combined effort of users, employers and
system administrator is required to fight against such
malevolent activities.
Keyword: Network security, risk, WEP key
INTRODUCTION
Wireless networks became part of every
organisation’s activity with increase in the use of the
internet, it becomes important to keep
communications like e-mail, e-commerce transactions
and data transmission secure. The reasons are very
clear, as wireless technologies comes with huge
advantage of being costless, easy to fix up and totally
mobile. The use of wireless communication has been
around since 1990’s mostly used in patented. The
obstacles to wireless communication during 90’s were
many, but these barriers are resolved in these days.
There is a huge growth to the use of wireless
technology especially in private sectors. The strong
advantages of wireless technologies it becomes
obvious that business wants to build such a
technology. It seems that there are many variety of
wireless network technologies in the market, but the
one which outstands is WLAN based on 802.11 then
we exploit the weaknesses of wireless networks and
list the various types of attacks possible on them[1].
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
and Risks in Wireless Network Security
C. Sountharraj1
, B. VeeraPandiyan2
1
Assistant Professor, 2
Student
Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India
Wireless networks are mostly common and are the
part of every organisation or an individual. In this
article we look into the technology of wireless
network and security features of WLANs, delinquent
EE 802.11 WLANs. There are
variety of attack methods that can be used against the
uses of wireless networks. Modern wireless data
network use a variety of techniques to provide
obstacles to such attacks. This article also discuss the
rity in an enterprise. We
conclude that combined effort of users, employers and
system administrator is required to fight against such
Network security, risk, WEP key
Wireless networks became part of every
organisation’s activity with increase in the use of the
internet, it becomes important to keep
commerce transactions
and data transmission secure. The reasons are very
clear, as wireless technologies comes with huge
of being costless, easy to fix up and totally
mobile. The use of wireless communication has been
around since 1990’s mostly used in patented. The
obstacles to wireless communication during 90’s were
many, but these barriers are resolved in these days.
e is a huge growth to the use of wireless
technology especially in private sectors. The strong
advantages of wireless technologies it becomes
obvious that business wants to build such a
technology. It seems that there are many variety of
echnologies in the market, but the
one which outstands is WLAN based on 802.11 then
we exploit the weaknesses of wireless networks and
list the various types of attacks possible on them[1].
TECHNOLOGY OF WIRELES NETWORK:
Wireless communication technology
alternative to traditional wire networking where wired
networks relay on cables to connect digital devices
together, wireless networks relay on wireless
technologies. Wireless technologies are widely used
in both home and business computer net
cost device is the foremost reason for wireless
technology in acquisition popularity. But such low
cost equipment’s also facilitates attackers to deploy an
attack. And these arrives need to have a secure and
well established wireless network in
VULNERABILITIES OF WIRELESS
NETWORK:
Vulnerabilities are common for both wired and
wireless networks. The attacks on wireless networks
that exploit the “over air” characteristics of the
wireless signals use the eavesdropping and MITM
attacks
Research and Development (IJTSRD)
www.ijtsrd.com
6 | Sep – Oct 2018
Oct 2018 Page: 930
n Wireless Network Security
Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India
TECHNOLOGY OF WIRELES NETWORK:
Wireless communication technology is a modern
alternative to traditional wire networking where wired
networks relay on cables to connect digital devices
together, wireless networks relay on wireless
technologies. Wireless technologies are widely used
in both home and business computer networks. Low
cost device is the foremost reason for wireless
technology in acquisition popularity. But such low
cost equipment’s also facilitates attackers to deploy an
attack. And these arrives need to have a secure and
well established wireless network in an enterprise.
VULNERABILITIES OF WIRELESS
Vulnerabilities are common for both wired and
wireless networks. The attacks on wireless networks
that exploit the “over air” characteristics of the
wireless signals use the eavesdropping and MITM
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Eavesdropping:
Eavesdropping can be described as accidently over
hearing a conversation and thus gaining important
information which is not easily available.
MITM attacks:
It is known as MAN-IN-THE-MIDDLE attack. The
MITM attack is one step beyond the Eavesdropping
attack[2]. This is an attack where the person secretly
relays and possibly alters the communication between
two parties who believe they are directly
communicates with each other.
In addition there is the possibility to acquire
unauthorized wireless access from a wireless service
point. The techniques that can be used are as follows:
Rogue Access Points
Rogue Clients
Open Access Points
WEP Key Attacks
Jamming
High Gain Antennas
Rogue Access Points:
A Rogue Access Points that has been installed on a
secure network without explicit authorization from a
local network administrator, whether added by a
employee or by an attacker.
Rogue Clients:
Enough client is a client that doesn’t belong to your
company but it is operating on your network anyway.
Open Access Point:
An Access Point is a device such as a wireless
that permits wireless devices to connect to a network.
WEP Key Attacks:
WIRED EQIVALENT PRIVACY is a security
algorithm for IEEE 802.11 wireless network
Jamming:
Jamming attacks are saviour denial -
attacks against wireless median
High Gain Antennas:
A High Gain Antenna is an antenna with a narrow
radio beam that is used to increase signal strength.
SECURITY FEARURES OF WLAN’s
The major security services for IEEE802.11 are
provided by wired equivalent privacy protocol. As per
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Eavesdropping can be described as accidently over
hearing a conversation and thus gaining important
information which is not easily available.
MIDDLE attack. The
yond the Eavesdropping
attack[2]. This is an attack where the person secretly
relays and possibly alters the communication between
two parties who believe they are directly
In addition there is the possibility to acquire
thorized wireless access from a wireless service
point. The techniques that can be used are as follows:
been installed on a
secure network without explicit authorization from a
local network administrator, whether added by a
Enough client is a client that doesn’t belong to your
etwork anyway.
An Access Point is a device such as a wireless router
permits wireless devices to connect to a network.
WIRED EQIVALENT PRIVACY is a security
algorithm for IEEE 802.11 wireless network
- of - service
A High Gain Antenna is an antenna with a narrow
radio beam that is used to increase signal strength.
SECURITY FEARURES OF WLAN’s
The major security services for IEEE802.11 are
provided by wired equivalent privacy protocol. As per
the IEEE standards there are three basic security
features described for wireless networks. They are
Authentication
Confidentiality
Integrity.
Authentication:
A primary goal of WEP (
PRIVACY) was to provide a security service to check
the ID of communicative clients stations. This gives
access control to the network by avoiding access to
the client station that cannot authenticate
Confidentiality:
Confidentiality, or Privacy, was a second goal of
WEP the intent was to prevent information
compromise from causal eavesdropping.
Integrity:
Another goal of WEP was a security service created
to ensure that messages are not mod
wireless clients and access the point in an active
attack.
THE RISKS OF WIRELESS SECURITY IN AN
ENTERPRISE:
For an enterprise there is lot more than just protecting
the network from various attacks. There are different
measures enterprise can take, in order to secure their
network and the most important one is to keep their
wireless access points as safe as possible. The
Important reason to keep access points safe is that the
attackers do not require specific packing tools as the
system itself finds the network when it comes in the
range. One of the major risks for an enterprise from
their own naïve employees the can contact company
databases from a browser and they do the same when
the want to work at home. The attackers can take
advantages of this and instead of breaking into the
security system they would observer the activities of
employees and given a chance would get enough
knowledge that they can then trick themselves as
sincere uses of the enterprise.
Conclusion:
Wireless network security faces a number of hurdles
and efforts are being put on, but are relatively new
and thus not fully developed. Since wireless
technology has huge market but has become almost
inexpensive. It is gaining popularity in all sorts of
business. These strength of the system security is
always countered by its weakest component. So the
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 931
the IEEE standards there are three basic security
features described for wireless networks. They are
WEP (WIRED EQIVALENT
PRIVACY) was to provide a security service to check
the ID of communicative clients stations. This gives
access control to the network by avoiding access to
the client station that cannot authenticate properly.
Confidentiality, or Privacy, was a second goal of
WEP the intent was to prevent information
compromise from causal eavesdropping.
Another goal of WEP was a security service created
to ensure that messages are not modified in transit
wireless clients and access the point in an active
THE RISKS OF WIRELESS SECURITY IN AN
For an enterprise there is lot more than just protecting
the network from various attacks. There are different
can take, in order to secure their
network and the most important one is to keep their
wireless access points as safe as possible. The
Important reason to keep access points safe is that the
attackers do not require specific packing tools as the
self finds the network when it comes in the
range. One of the major risks for an enterprise from
their own naïve employees the can contact company
databases from a browser and they do the same when
the want to work at home. The attackers can take
s of this and instead of breaking into the
security system they would observer the activities of
employees and given a chance would get enough
knowledge that they can then trick themselves as
curity faces a number of hurdles
and efforts are being put on, but are relatively new
and thus not fully developed. Since wireless
technology has huge market but has become almost
inexpensive. It is gaining popularity in all sorts of
th of the system security is
always countered by its weakest component. So the
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
end-users must be given proper training on how to
secure the data when they are at home or at the private
sectors. So that the combined effort of users,
employers and system administrators against such
malicious activities. Appropriate counter measures
can help the organisation to minimise the risk of
illegal penetration.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
users must be given proper training on how to
secure the data when they are at home or at the private
sectors. So that the combined effort of users,
inistrators against such
malicious activities. Appropriate counter measures
can help the organisation to minimise the risk of
REFERENCES:
1. https://www.researchgate.net/...A.../Wireless
Network-Security-A-filed-
2. https://epdf.tips/handbook-
networks-applications-technology
st.html
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 932
https://www.researchgate.net/...A.../Wireless-
-Study
-of-wireless-local-area-
technology-security-and-

More Related Content

What's hot

Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
Digital Policy and Law Consulting
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
IJNSA Journal
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET Journal
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ijtsrd
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
Ch 04 wireless security
Ch 04 wireless securityCh 04 wireless security
Ch 04 wireless security
ChaushreeeLamichhane
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis MPhil/MRes/BSc
 
Fitsum R. Lakew Wireless Network Security Threat
Fitsum  R.  Lakew  Wireless  Network  Security  ThreatFitsum  R.  Lakew  Wireless  Network  Security  Threat
Fitsum R. Lakew Wireless Network Security Threat
FITSUM RISTU LAKEW
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
Frank Siepmann
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Dr. Amarjeet Singh
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
William Chipman
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
IJNSA Journal
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
NetFlow Analyzer
 
IOT Security
IOT SecurityIOT Security
IOT Security
Sylvain Martinez
 

What's hot (18)

Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized Users
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Ch 04 wireless security
Ch 04 wireless securityCh 04 wireless security
Ch 04 wireless security
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
Fitsum R. Lakew Wireless Network Security Threat
Fitsum  R.  Lakew  Wireless  Network  Security  ThreatFitsum  R.  Lakew  Wireless  Network  Security  Threat
Fitsum R. Lakew Wireless Network Security Threat
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
Cyber security
Cyber securityCyber security
Cyber security
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
 
IOT Security
IOT SecurityIOT Security
IOT Security
 

Similar to Attacks and Risks in Wireless Network Security

1Table of Contents.docx
1Table of Contents.docx1Table of Contents.docx
1Table of Contents.docx
felicidaddinwoodie
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
Sarath K Sukumar
 
A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless Networks
Scott Bou
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IJNSA Journal
 
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxComposition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
donnajames55
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
International Journal for management Science and Technology - https://www.ijmst.com/
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
abenimelos
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
Dustin Pytko
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
IJAEMSJORNAL
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
IJNSA Journal
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
IJNSA Journal
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
Edie II
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
IJNSA Journal
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
Steven Wallach
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
IJNSA Journal
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET Journal
 

Similar to Attacks and Risks in Wireless Network Security (20)

1Table of Contents.docx
1Table of Contents.docx1Table of Contents.docx
1Table of Contents.docx
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless Networks
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxComposition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
AngelicaLubrica
 
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Murugan Solaiyappan
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Brajeswar Paul
 
How to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 NotebookHow to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 Notebook
Celine George
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
Celine George
 
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ..."DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
thanhluan21
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
JackieSparrow3
 
How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17
Celine George
 
NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
MichelleDeLaCruz93
 
How to Store Data on the Odoo 17 Website
How to Store Data on the Odoo 17 WebsiteHow to Store Data on the Odoo 17 Website
How to Store Data on the Odoo 17 Website
Celine George
 
Views in Odoo - Advanced Views - Pivot View in Odoo 17
Views in Odoo - Advanced Views - Pivot View in Odoo 17Views in Odoo - Advanced Views - Pivot View in Odoo 17
Views in Odoo - Advanced Views - Pivot View in Odoo 17
Celine George
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
MysoreMuleSoftMeetup
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
heathfieldcps1
 
matatag curriculum education for Kindergarten
matatag curriculum education for Kindergartenmatatag curriculum education for Kindergarten
matatag curriculum education for Kindergarten
SarahAlie1
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Liyana Rozaini
 
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUMENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
HappieMontevirgenCas
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
ibtesaam huma
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
RHODAJANEAURESTILA
 
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Neny Isharyanti
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
Celine George
 

Recently uploaded (20)

NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
 
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
 
How to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 NotebookHow to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 Notebook
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
 
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ..."DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
"DANH SÁCH THÍ SINH XÉT TUYỂN SỚM ĐỦ ĐIỀU KIỆN TRÚNG TUYỂN ĐẠI HỌC CHÍNH QUY ...
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
 
How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17How to Handle the Separate Discount Account on Invoice in Odoo 17
How to Handle the Separate Discount Account on Invoice in Odoo 17
 
NLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptxNLC Grade 3.................................... ppt.pptx
NLC Grade 3.................................... ppt.pptx
 
How to Store Data on the Odoo 17 Website
How to Store Data on the Odoo 17 WebsiteHow to Store Data on the Odoo 17 Website
How to Store Data on the Odoo 17 Website
 
Views in Odoo - Advanced Views - Pivot View in Odoo 17
Views in Odoo - Advanced Views - Pivot View in Odoo 17Views in Odoo - Advanced Views - Pivot View in Odoo 17
Views in Odoo - Advanced Views - Pivot View in Odoo 17
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
matatag curriculum education for Kindergarten
matatag curriculum education for Kindergartenmatatag curriculum education for Kindergarten
matatag curriculum education for Kindergarten
 
Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)Bedok NEWater Photostory - COM322 Assessment (Story 2)
Bedok NEWater Photostory - COM322 Assessment (Story 2)
 
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUMENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
ENGLISH-7-CURRICULUM MAP- MATATAG CURRICULUM
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
 
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
 
Delegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use CasesDelegation Inheritance in Odoo 17 and Its Use Cases
Delegation Inheritance in Odoo 17 and Its Use Cases
 

Attacks and Risks in Wireless Network Security

  • 1. International Journal of Trend in International Open Access Journal ISSN No: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Attacks and Risks i A. C. Department of BCA & MSC.SS, Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India ABSTRACT Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. Keyword: Network security, risk, WEP key INTRODUCTION Wireless networks became part of every organisation’s activity with increase in the use of the internet, it becomes important to keep communications like e-mail, e-commerce transactions and data transmission secure. The reasons are very clear, as wireless technologies comes with huge advantage of being costless, easy to fix up and totally mobile. The use of wireless communication has been around since 1990’s mostly used in patented. The obstacles to wireless communication during 90’s were many, but these barriers are resolved in these days. There is a huge growth to the use of wireless technology especially in private sectors. The strong advantages of wireless technologies it becomes obvious that business wants to build such a technology. It seems that there are many variety of wireless network technologies in the market, but the one which outstands is WLAN based on 802.11 then we exploit the weaknesses of wireless networks and list the various types of attacks possible on them[1]. International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal | www.ijtsrd.com ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 and Risks in Wireless Network Security C. Sountharraj1 , B. VeeraPandiyan2 1 Assistant Professor, 2 Student Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent EE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the rity in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such Network security, risk, WEP key Wireless networks became part of every organisation’s activity with increase in the use of the internet, it becomes important to keep commerce transactions and data transmission secure. The reasons are very clear, as wireless technologies comes with huge of being costless, easy to fix up and totally mobile. The use of wireless communication has been around since 1990’s mostly used in patented. The obstacles to wireless communication during 90’s were many, but these barriers are resolved in these days. e is a huge growth to the use of wireless technology especially in private sectors. The strong advantages of wireless technologies it becomes obvious that business wants to build such a technology. It seems that there are many variety of echnologies in the market, but the one which outstands is WLAN based on 802.11 then we exploit the weaknesses of wireless networks and list the various types of attacks possible on them[1]. TECHNOLOGY OF WIRELES NETWORK: Wireless communication technology alternative to traditional wire networking where wired networks relay on cables to connect digital devices together, wireless networks relay on wireless technologies. Wireless technologies are widely used in both home and business computer net cost device is the foremost reason for wireless technology in acquisition popularity. But such low cost equipment’s also facilitates attackers to deploy an attack. And these arrives need to have a secure and well established wireless network in VULNERABILITIES OF WIRELESS NETWORK: Vulnerabilities are common for both wired and wireless networks. The attacks on wireless networks that exploit the “over air” characteristics of the wireless signals use the eavesdropping and MITM attacks Research and Development (IJTSRD) www.ijtsrd.com 6 | Sep – Oct 2018 Oct 2018 Page: 930 n Wireless Network Security Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India TECHNOLOGY OF WIRELES NETWORK: Wireless communication technology is a modern alternative to traditional wire networking where wired networks relay on cables to connect digital devices together, wireless networks relay on wireless technologies. Wireless technologies are widely used in both home and business computer networks. Low cost device is the foremost reason for wireless technology in acquisition popularity. But such low cost equipment’s also facilitates attackers to deploy an attack. And these arrives need to have a secure and well established wireless network in an enterprise. VULNERABILITIES OF WIRELESS Vulnerabilities are common for both wired and wireless networks. The attacks on wireless networks that exploit the “over air” characteristics of the wireless signals use the eavesdropping and MITM
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Eavesdropping: Eavesdropping can be described as accidently over hearing a conversation and thus gaining important information which is not easily available. MITM attacks: It is known as MAN-IN-THE-MIDDLE attack. The MITM attack is one step beyond the Eavesdropping attack[2]. This is an attack where the person secretly relays and possibly alters the communication between two parties who believe they are directly communicates with each other. In addition there is the possibility to acquire unauthorized wireless access from a wireless service point. The techniques that can be used are as follows: Rogue Access Points Rogue Clients Open Access Points WEP Key Attacks Jamming High Gain Antennas Rogue Access Points: A Rogue Access Points that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a employee or by an attacker. Rogue Clients: Enough client is a client that doesn’t belong to your company but it is operating on your network anyway. Open Access Point: An Access Point is a device such as a wireless that permits wireless devices to connect to a network. WEP Key Attacks: WIRED EQIVALENT PRIVACY is a security algorithm for IEEE 802.11 wireless network Jamming: Jamming attacks are saviour denial - attacks against wireless median High Gain Antennas: A High Gain Antenna is an antenna with a narrow radio beam that is used to increase signal strength. SECURITY FEARURES OF WLAN’s The major security services for IEEE802.11 are provided by wired equivalent privacy protocol. As per International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Eavesdropping can be described as accidently over hearing a conversation and thus gaining important information which is not easily available. MIDDLE attack. The yond the Eavesdropping attack[2]. This is an attack where the person secretly relays and possibly alters the communication between two parties who believe they are directly In addition there is the possibility to acquire thorized wireless access from a wireless service point. The techniques that can be used are as follows: been installed on a secure network without explicit authorization from a local network administrator, whether added by a Enough client is a client that doesn’t belong to your etwork anyway. An Access Point is a device such as a wireless router permits wireless devices to connect to a network. WIRED EQIVALENT PRIVACY is a security algorithm for IEEE 802.11 wireless network - of - service A High Gain Antenna is an antenna with a narrow radio beam that is used to increase signal strength. SECURITY FEARURES OF WLAN’s The major security services for IEEE802.11 are provided by wired equivalent privacy protocol. As per the IEEE standards there are three basic security features described for wireless networks. They are Authentication Confidentiality Integrity. Authentication: A primary goal of WEP ( PRIVACY) was to provide a security service to check the ID of communicative clients stations. This gives access control to the network by avoiding access to the client station that cannot authenticate Confidentiality: Confidentiality, or Privacy, was a second goal of WEP the intent was to prevent information compromise from causal eavesdropping. Integrity: Another goal of WEP was a security service created to ensure that messages are not mod wireless clients and access the point in an active attack. THE RISKS OF WIRELESS SECURITY IN AN ENTERPRISE: For an enterprise there is lot more than just protecting the network from various attacks. There are different measures enterprise can take, in order to secure their network and the most important one is to keep their wireless access points as safe as possible. The Important reason to keep access points safe is that the attackers do not require specific packing tools as the system itself finds the network when it comes in the range. One of the major risks for an enterprise from their own naïve employees the can contact company databases from a browser and they do the same when the want to work at home. The attackers can take advantages of this and instead of breaking into the security system they would observer the activities of employees and given a chance would get enough knowledge that they can then trick themselves as sincere uses of the enterprise. Conclusion: Wireless network security faces a number of hurdles and efforts are being put on, but are relatively new and thus not fully developed. Since wireless technology has huge market but has become almost inexpensive. It is gaining popularity in all sorts of business. These strength of the system security is always countered by its weakest component. So the International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 931 the IEEE standards there are three basic security features described for wireless networks. They are WEP (WIRED EQIVALENT PRIVACY) was to provide a security service to check the ID of communicative clients stations. This gives access control to the network by avoiding access to the client station that cannot authenticate properly. Confidentiality, or Privacy, was a second goal of WEP the intent was to prevent information compromise from causal eavesdropping. Another goal of WEP was a security service created to ensure that messages are not modified in transit wireless clients and access the point in an active THE RISKS OF WIRELESS SECURITY IN AN For an enterprise there is lot more than just protecting the network from various attacks. There are different can take, in order to secure their network and the most important one is to keep their wireless access points as safe as possible. The Important reason to keep access points safe is that the attackers do not require specific packing tools as the self finds the network when it comes in the range. One of the major risks for an enterprise from their own naïve employees the can contact company databases from a browser and they do the same when the want to work at home. The attackers can take s of this and instead of breaking into the security system they would observer the activities of employees and given a chance would get enough knowledge that they can then trick themselves as curity faces a number of hurdles and efforts are being put on, but are relatively new and thus not fully developed. Since wireless technology has huge market but has become almost inexpensive. It is gaining popularity in all sorts of th of the system security is always countered by its weakest component. So the
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com end-users must be given proper training on how to secure the data when they are at home or at the private sectors. So that the combined effort of users, employers and system administrators against such malicious activities. Appropriate counter measures can help the organisation to minimise the risk of illegal penetration. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 users must be given proper training on how to secure the data when they are at home or at the private sectors. So that the combined effort of users, inistrators against such malicious activities. Appropriate counter measures can help the organisation to minimise the risk of REFERENCES: 1. https://www.researchgate.net/...A.../Wireless Network-Security-A-filed- 2. https://epdf.tips/handbook- networks-applications-technology st.html International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 932 https://www.researchgate.net/...A.../Wireless- -Study -of-wireless-local-area- technology-security-and-