Academic literature on the topic 'Wireless LAN Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless LAN Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wireless LAN Security"

1

Andress, Mandy. "Wireless LAN Security." Information Systems Security 11, no. 3 (July 2002): 29–33. http://dx.doi.org/10.1201/1086/43321.11.3.20020708/37897.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gholap, Prof Yuvraj N. "Study of Wireless LAN Security 802.11b." Indian Journal of Applied Research 4, no. 2 (October 1, 2011): 11–13. http://dx.doi.org/10.15373/2249555x/feb2014/73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Held, Gilbert. "Overcoming Wireless LAN Security Vulnerabilities." Information Systems Security 11, no. 3 (July 2002): 22–27. http://dx.doi.org/10.1201/1086/43321.11.3.20020708/37896.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Paulson, L. D. "Vendors push wireless LAN security." Computer 36, no. 1 (January 2003): 28. http://dx.doi.org/10.1109/mc.2003.1160051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

GHERGHINA, Cătălina, and Gabriel PETRICĂ. "Wireless LAN Security Issues (II). Security Assurance." International Journal of Information Security and Cybercrime 3, no. 1 (June 28, 2014): 37–46. http://dx.doi.org/10.19107/ijisc.2014.01.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Furnell, Steven, and Bogdan Ghita. "Usability pitfalls in Wireless LAN security." Network Security 2006, no. 3 (March 2006): 4–8. http://dx.doi.org/10.1016/s1353-4858(06)70343-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Branch, J. W., N. L. Petroni, L. Van Doorn, and D. Safford. "Autonomic 802.11 wireless LAN security auditing." IEEE Security & Privacy Magazine 2, no. 3 (May 2004): 56–65. http://dx.doi.org/10.1109/msp.2004.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Williams, J. "Providing for wireless LAN security. 2." IT Professional 4, no. 6 (November 2002): 44–48. http://dx.doi.org/10.1109/mitp.2002.1114847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jyh-Cheng Chen, Ming-Chia Jiang, and Yi-Wen Liu. "Wireless LAN security and IEEE 802.11i." IEEE Wireless Communications 12, no. 1 (February 2005): 27–36. http://dx.doi.org/10.1109/mwc.2005.1404570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.

Full text
Abstract:
With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually extend to the use of radio. Although it brought a lot of convenience to people's lives, wireless LAN security problems also frequently occurred. This paper mainly aims to analyze the security risk and at the same time offer some preventive measures.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Wireless LAN Security"

1

McCarter, Harold Lars. "Analyzing Wireless LAN Security Overhead." Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/31789.

Full text
Abstract:
Wireless local area networks (WLAN) are beginning to play a much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes for hackers and thieves to abuse, which is finally being addressed by stronger security methods such as advanced encryption algorithms and efficient authentication processes. However, these security methods often hamper network performance unbeknownst to engineers and users. This research examines the effects of Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and Counter Mode/CBC-MAC Protocol (CCMP) encryption algorithms on throughput rates for IEEE 802.11 networks as well as the authentication times for Lightweight Extensible Authentication Protocol (LEAP) and Protected Extensible Authentication Protocol (PEAP). The research shows that todayâ s wireless hardware is capable of reducing overhead of even the most advanced encryption schemes to less than five percent of the total bandwidth.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
2

Schirninger, Rene, and Stefan Zeppetzauer. "Wireless On-Board Diagnostics." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-193.

Full text
Abstract:

Wireless On-board diagnostics functionality, which is a future outlook to vehicle system

parameter analysis, enables measurements and controlling without the limitation of a physical

connector. Today every vehicle must by law provide the possibility to analyze engine and

emission related parameters (OBD II). The wireless connection requires a high security level

to prevent unauthorized communication establishment with the truck’s bus system. The aim

of the project is to make a survey of the available security mechanisms and to find the most

promising solutions. Furthermore, several usage scenarios and access right levels are

specified and a risk analysis of the whole system is made. The greatest challenge is the

specification and implementation of a proper key-exchange mechanism between the analyzing

device and the truck’s bus system, which is therefore carried out with the highest possible

level of awareness. Consequently several different concepts have been formulated based on

the different usage scenarios.

APA, Harvard, Vancouver, ISO, and other styles
3

Skoglund, Johan. "Security of IEEE 802.11b." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1656.

Full text
Abstract:

The IEEE 802.11b standard is today the only commonly used standard in Europe for fast wireless networks. This makes it possible to connect computers to networks in places where it is not possible to use wires. Examples of such situations are internet access at airports, communication in emergency areas or for military communication. Common for all these situations is that network security is important.

This thesis consists of two different parts. The first part handles the security mechanisms and the second part is an evaluation of the possibilities to use IEEE 802.11b in embedded applications. The part that handles the security includes the security mechanisms found in the standard, flaws in these mechanisms and methods that try to reduce these problems.

APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Zhiguo. "Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/862.

Full text
Abstract:
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. However, these applications are predicated on the assumption of availability and confidentiality. Error-prone wireless networks afford an attacker considerable flexibility to exploit the vulnerabilities of 802.11-based mechanism. Two of most famous misbehaviors are selfish and malicious attacks. In this thesis we investigate two attacks: Spurious CTS attack (SCTS) and Jamming ACK attack (JACK). In the SCTS, malicious nodes may send periodic Spurious CTS packets to force other nodes to update their NAV values and prevent them from using the channel. In the JACK, an attacker ruins legitimate ACK packets for the intention of disrupting the traffic flow and draining the battery energy of victim nodes quickly. Correspondingly, we propose solutions: termed Carrier Sensing based Discarding (CSD), and Extended Network Allocation Vector (ENAV) scheme. We further demonstrate the performance of our proposed schemes through analysis and NS2 simulations.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.

Full text
Abstract:
Thesis (MTech (Information Technology))--Peninsula Technikon, 2004
Encryption was used whenever someone wanted to send a secret message to someone. The quality of the algorithm and key combination were the factors that ensured the strength of the system. However, until there were some automation one could not use complex methods for encryption because it simply took too long to encrypt and decrypt messages (even worse for images), manually. Optical technologies have recently been employed in encryption. Compared with traditional computer and electrical systems, optical technologies offer primarily two types of benefits, namely optical systems have an inherent capability for parallel processing, that is, rapid transmission of information, and information can be hidden in any of several dimensions, such as phase or spatial frequency. Optical systems therefore have an excellent capability for encoding information. In this project an image encryption technique was developed using exclusive-OR (XOR) operations in the optical domain before the captured image entered a digital computer network for further processing. A gray-level image of the object to be encrypted was converted a binary format and a pixel by pixel exclusive OR operation was performed on it with a random key-bit by making use of polarization encoding in LCD technology, before the encrypted binary image was detected by a CCD. The image may also be used as an input to a computer for comparison with a database. However, noise alters the encrypted bit and the value of the noisy encrypted bit is no longer binary. In this research the encryption techniques was evaluated and tested for applicability to encrypt and decrypt successfully. The noise performance was tested and compared. The technique was applied for image transmission over a wireless IP broadband link. Images (optical and thermal) captured from telemedicine application was transmitted and decrypted with reasonable success in this application.
APA, Harvard, Vancouver, ISO, and other styles
6

Mundi, Anuj V. "PLC-WiFi hybrid broadband Internet deployment and security /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0006964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ozan, Orhan. "Denial of service attacks on 802.1X security protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOzan.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jaiaree, Thoetsak. "The security aspects of wireless local area network (WLAN)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FJaiaree.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2003.
Thesis advisor(s): Norman F. Schneidewind, Douglas E. Brinkley. Includes bibliographical references (p. 75-78). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Oh, Khoon Wee. "Wireless network security : design considerations for an enterprise network /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FOh.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Full text
Abstract:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates the feasibility of using these elements together.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Wireless LAN Security"

1

Krishna, Sankar, ed. Cisco wireless LAN security. Indianapolis, IN: Cisco, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

How secure is your wireless network?: Safeguarding your Wi-Fi- LAN. Upper Saddle River, NJ: Prentice Hall PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wireless security. Boca Raton, FL: CRC Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wireless security handbook. Boca Raton, FL: Auerbach, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

F, Ransome James, ed. Wireless operational security. Amsterdam: Elsevier Digital Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wright, Joshua. Hacking Exposed Wireless: Wireless security secrets & solutions. 2nd ed. New York, USA: McGraw-Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Seth, Fogie, ed. Maximum wireless security. Indianapolis, Ind: Sams, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Peikari, Cyrus. Maximum Wireless Security. Upper Saddle River: Pearson Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

CWSP guide to wireless security. Boston, Mass: Thomson Course Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wrightson, Tyler. Wireless network security: A beginner's guide. New York: McGraw-Hill, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Wireless LAN Security"

1

Tagg, Gary L., and Jason Sinchak. "802.11 Wireless Lan Security." In Computer Security Handbook, 33.1–33.53. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ksentini, A., A. Gueroui, and M. Naimi. "Adaptive AIFS in Wireless LAN." In Network Control and Engineering for QoS, Security and Mobility II, 78–89. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35703-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Groß, Stephan, Sabine Lein, and Sandra Steinbrecher. "A Multilateral Secure Payment System for Wireless LAN Hotspots." In Trust, Privacy, and Security in Digital Business, 80–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11537878_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fu, Cai, Deliang Xu, Lansheng Han, Jingfang Xu, and Zhicun Fang. "Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN." In Cyberspace Safety and Security, 429–40. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03584-0_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Kyung-jun, Hyun-sook Kim, Sang-don Lee, and Ki-jun Han. "An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN." In Security and Privacy in the Age of Ubiquitous Computing, 239–49. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-25660-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bera, P., Soumya Maity, S. K. Ghosh, and Pallab Dasgupta. "A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model." In Recent Trends in Network Security and Applications, 232–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14478-3_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bera, P., S. K. Ghosh, and Pallab Dasgupta. "A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management." In Information Systems, Technology and Management, 76–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12035-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Zhou, Tan Fang-yong, and Gao Xiao-hui. "Research and Implementation of Security Wireless LANs Based on EAP-TLS and IPSec VPN." In Advances in Intelligent and Soft Computing, 103–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29637-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Wireless LAN Security." In Network and Data Security for Non-Engineers, 203–18. Boca Raton : CRC Press, Taylor & Francis Group, an Informa: Auerbach Publications, 2016. http://dx.doi.org/10.1201/9781315381138-25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Wireless LAN Security." In Wireless Security Handbook. Auerbach Publications, 2005. http://dx.doi.org/10.1201/9781420031188.ch12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wireless LAN Security"

1

Feng, Pan. "Wireless LAN security issues and solutions." In 2012 IEEE Symposium on Robotics and Applications (ISRA). IEEE, 2012. http://dx.doi.org/10.1109/isra.2012.6219343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Waheed, Fareeha, Sadia Muhiuddin, and Saqib M. Ilyas. "Multi-Level Security for Wireless LAN." In 2005 Student Conference on Engineering Sciences and Technology. IEEE, 2005. http://dx.doi.org/10.1109/sconest.2005.4382904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nishi, Ryuzou, Yoshiaki Hori, and Kouichi Sakurai. "Secrecy Capacity of Wireless LAN." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tao, Ping, Algis Rudys, Andrew M. Ladd, and Dan S. Wallach. "Wireless LAN location-sensing for security applications." In the 2003 ACM workshop. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/941311.941314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kouhbor, Shahnaz. "Physical Security Enhancement in Wireless LAN Systems." In 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, 2007. http://dx.doi.org/10.1109/issnip.2007.4496934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tang, Yong li, Jin Yan, Jin xia Yu, and Qian Zhao. "Research on Improved Dynamic Security LAN." In 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2011. http://dx.doi.org/10.1109/wicom.2011.6040524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Luu, Brian B., and Richard D. Gopaul. "Wireless LAN signal strength in a 3-story cinderblock building." In Defense and Security Symposium, edited by Raghuveer M. Rao, Sohail A. Dianat, and Michael D. Zoltowski. SPIE, 2006. http://dx.doi.org/10.1117/12.665101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhuo Chang, Qiang He, Peng-Yuan Zhao, and Jin-Song Liu. "A Wireless-LAN security model based on Computer Immunology." In 2009 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2009. http://dx.doi.org/10.1109/icmlc.2009.5212158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhengqiu, Lu, Tian Si, Wang Ming, Ye Peisong, and Chen Qingzhang. "Security analysis and recommendations for Wireless LAN 802.11b network." In 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, 2011. http://dx.doi.org/10.1109/cecnet.2011.5768358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McHugh, Kyle, Walter Akpedeye, and Thaier Hayajneh. "Next generation wireless-LAN: Security issues and performance analysis." In 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2017. http://dx.doi.org/10.1109/ccwc.2017.7868405.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Wireless LAN Security"

1

King, J. IEEE 802.11 Wireless LAN Security White Paper. Office of Scientific and Technical Information (OSTI), October 2001. http://dx.doi.org/10.2172/15005940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography