The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth of WLAN over past few years has increased immensely in academia as well as in every industry, but many weaknesses are there in ad hoc network, due to this many attackers are really passionate towards authorization. For the authentication defense mechanism and wireless monitoring has become a vital component of computer security to predict and prevent attacks. In this paper, we explain...
As the widespread deployment and usage of 802.11-based wireless local area networks (WLANs), Wi-Fi users are vulnerable to be attacked by a security threat called evil twins. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Malicious adversaries can easily configure evil twins on a laptop to induce victim wireless users...
Wireless Network Card (WNC) manufacturers are capable of implementing algorithms in the IEEE 802.11 protocol dynamically. This fact may allow some WNCs to occupy channels in illegal ways with the purpose of delivering data at higher rates. In order to prevent this occurrence, it is important to develop methodologies to identify anomalies of WNC behavior. In the experiments discussed here, we demonstrate...
Now a day's wireless LAN is widely used in many public spaces. Wireless access points expand wired network. It provides more flexibility to the users. There is a big risk that users connect to rogue access point (Rogue AP). Detection of rogue AP is a challenge for network administrator. Undetected rogue APs are serious threats which steal sensitive information from the network. There are many techniques...
Illegal Access Point called as Rogue Access Point (RAP) is an access point that has been installed on a secure network without explicit authorization from a system administrator Wireless Networks has big security threat called Rough access points. If care is not taken and if this network threats are not detected and mitigated on time, this will result into the serious network damage and data loss...
In this paper, the program uses the wireless AP to deploy campus wlan, in order to achieve a wide network coverage and security, high-speed data transmission. To meet the future needs of the campus network, we use the 802.11n standard, and adopt a new technique in management: a hardware device by carrying two or more ssid, to achieve efficient management of the campus network, the more extensive coverage...
The characteristic of the IEEE802.11 protocol and the principle of the DoS attack against 802.11 WLAN is analyzed in this paper. a general system model for WLAN network intrusion detection and 802.11 DoS attack analysis based on the intelligent terminal is advanced. On the base of the research on using NDIS IMD to realize packet capturing and its developing process, a system of intrusion detection...
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
In this paper we discuss the application of multiple-wireless technology to a practical context-enhanced service system called ViewNet. ViewNet develops technologies to support enhanced coordination and cooperation between operation teams in the emergency services and the police. Distributed localisation of users and mapping of environments implemented over a secure wireless network enables teams...
Rapid advances in mobile and network technologies in recent years have opened new opportunities for new and innovative means of healthcare delivery. Implementation of telemedicine system using mobile/ wireless technologies in the time to come will exploit the recent advances in mobile communication technologies. Brief overview of current mobile telecommunication technologies for health like 2.5G-,...
This paper presents a Toolset that can be used to evaluate the performance and effectiveness of wireless intrusion detection techniques. Recently, autonomic computing methods have been widely used for intrusion detection [1]. Although some wireless intrusion detection systems (WIDSs) exist on the market, recent studies show that wireless networks are still vulnerable to complex, dynamic, and knowledgeable...
As Wireless Mesh Networks (WMNs) are newly emerging wireless technologies, they are designed to have huge potential for strengthening Internet deployment and access. However, they are far from mature for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. The main challenges exposed to the security of WMNs come from the facts of the shared nature...
ZigBee technology has become the standard of choice among other wireless technologies by providing efficient low-power connectivity while allowing for a large number of devices to be part of a single network. The security of the ZigBee communication becomes the important role. But, ZigBee cannot provide sufficient security when large sensor networks appeared. To address these limitations, we propose...
Wireless IDS (Intrusion Detection System) can help network system quickly identify attacks, which extends the system administrator's security management capabilities (including security audits, monitoring, attack recognition and response), improves the integrity of the information security infrastructure. Wireless IDS will be an important part of the wireless LAN. Although it still has some flaws,...
Discuss the apply demand of campus wireless network compares wireless IEEE802.11 technology and wireless mesh network technology wireless network structure design on modern campus.
Advances in wireless sensor networks and embedded devices make it possible to develop new solutions for smart home health care at a low cost. This paper describes a wireless body sensor system that monitors physiological vital signs of a person while staying at home. Specifically, a waist-mounted triaxial accelerometer unit is used to record human movements. Sampled data are transmitted using an IEEE...
With the fast development of WLAN, wireless intrusion prevention systems have recently become the research hotspot. In this paper, we first analyze the drawbacks of WLAN and indicate the primary 802.11-specific threats, then present the framework of the wireless IPS with an intelligent plan recognition and pre-decision engine using honeypot technology, especially illustrate the need for plan recognition...
A short-distance wireless transmission program of laser echo signal was proposed to solve the problems: atrocious conditions, wiring in need of special protection, the cost of higher. The digital echo signal was transmitted into embedded single-chip LPC2880, through the wireless transmission module PTR4000, the signal was transmitted to the receiving system. Receiving system will receive the signal...
Hospitals and medical health services are large business that we have to make them successful for their earned profits and incomes. Unifying the communication in hospitals can approve the environments and avoid the problems faced. Wireless networks are very useful in large crowded places like hospitals. Wireless technology has empowered the medical health systems by reducing the paperwork that nurses...
Communication has become wireless. The free airwaves are being beneficially and optimally leveraged to transmit multimedia data including human voice and thereby today cable-free environments are seeing the light. That is, all the clutter and chaos due to enormous amount of intertwined wires and cables for networking has become a thing of the past. Over the years, several wireless standards and compliant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.