Academic literature on the topic 'Wireless LAN Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless LAN Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wireless LAN Security"
Andress, Mandy. "Wireless LAN Security." Information Systems Security 11, no. 3 (July 2002): 29–33. http://dx.doi.org/10.1201/1086/43321.11.3.20020708/37897.5.
Full textGholap, Prof Yuvraj N. "Study of Wireless LAN Security 802.11b." Indian Journal of Applied Research 4, no. 2 (October 1, 2011): 11–13. http://dx.doi.org/10.15373/2249555x/feb2014/73.
Full textHeld, Gilbert. "Overcoming Wireless LAN Security Vulnerabilities." Information Systems Security 11, no. 3 (July 2002): 22–27. http://dx.doi.org/10.1201/1086/43321.11.3.20020708/37896.4.
Full textPaulson, L. D. "Vendors push wireless LAN security." Computer 36, no. 1 (January 2003): 28. http://dx.doi.org/10.1109/mc.2003.1160051.
Full textGHERGHINA, Cătălina, and Gabriel PETRICĂ. "Wireless LAN Security Issues (II). Security Assurance." International Journal of Information Security and Cybercrime 3, no. 1 (June 28, 2014): 37–46. http://dx.doi.org/10.19107/ijisc.2014.01.04.
Full textFurnell, Steven, and Bogdan Ghita. "Usability pitfalls in Wireless LAN security." Network Security 2006, no. 3 (March 2006): 4–8. http://dx.doi.org/10.1016/s1353-4858(06)70343-9.
Full textBranch, J. W., N. L. Petroni, L. Van Doorn, and D. Safford. "Autonomic 802.11 wireless LAN security auditing." IEEE Security & Privacy Magazine 2, no. 3 (May 2004): 56–65. http://dx.doi.org/10.1109/msp.2004.4.
Full textWilliams, J. "Providing for wireless LAN security. 2." IT Professional 4, no. 6 (November 2002): 44–48. http://dx.doi.org/10.1109/mitp.2002.1114847.
Full textJyh-Cheng Chen, Ming-Chia Jiang, and Yi-Wen Liu. "Wireless LAN security and IEEE 802.11i." IEEE Wireless Communications 12, no. 1 (February 2005): 27–36. http://dx.doi.org/10.1109/mwc.2005.1404570.
Full textJiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.
Full textDissertations / Theses on the topic "Wireless LAN Security"
McCarter, Harold Lars. "Analyzing Wireless LAN Security Overhead." Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/31789.
Full textMaster of Science
Schirninger, Rene, and Stefan Zeppetzauer. "Wireless On-Board Diagnostics." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-193.
Full textWireless On-board diagnostics functionality, which is a future outlook to vehicle system
parameter analysis, enables measurements and controlling without the limitation of a physical
connector. Today every vehicle must by law provide the possibility to analyze engine and
emission related parameters (OBD II). The wireless connection requires a high security level
to prevent unauthorized communication establishment with the truck’s bus system. The aim
of the project is to make a survey of the available security mechanisms and to find the most
promising solutions. Furthermore, several usage scenarios and access right levels are
specified and a risk analysis of the whole system is made. The greatest challenge is the
specification and implementation of a proper key-exchange mechanism between the analyzing
device and the truck’s bus system, which is therefore carried out with the highest possible
level of awareness. Consequently several different concepts have been formulated based on
the different usage scenarios.
Skoglund, Johan. "Security of IEEE 802.11b." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1656.
Full textThe IEEE 802.11b standard is today the only commonly used standard in Europe for fast wireless networks. This makes it possible to connect computers to networks in places where it is not possible to use wires. Examples of such situations are internet access at airports, communication in emergency areas or for military communication. Common for all these situations is that network security is important.
This thesis consists of two different parts. The first part handles the security mechanisms and the second part is an evaluation of the possibilities to use IEEE 802.11b in embedded applications. The part that handles the security includes the security mechanisms found in the standard, flaws in these mechanisms and methods that try to reduce these problems.
Zhang, Zhiguo. "Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/862.
Full textZhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.
Full textEncryption was used whenever someone wanted to send a secret message to someone. The quality of the algorithm and key combination were the factors that ensured the strength of the system. However, until there were some automation one could not use complex methods for encryption because it simply took too long to encrypt and decrypt messages (even worse for images), manually. Optical technologies have recently been employed in encryption. Compared with traditional computer and electrical systems, optical technologies offer primarily two types of benefits, namely optical systems have an inherent capability for parallel processing, that is, rapid transmission of information, and information can be hidden in any of several dimensions, such as phase or spatial frequency. Optical systems therefore have an excellent capability for encoding information. In this project an image encryption technique was developed using exclusive-OR (XOR) operations in the optical domain before the captured image entered a digital computer network for further processing. A gray-level image of the object to be encrypted was converted a binary format and a pixel by pixel exclusive OR operation was performed on it with a random key-bit by making use of polarization encoding in LCD technology, before the encrypted binary image was detected by a CCD. The image may also be used as an input to a computer for comparison with a database. However, noise alters the encrypted bit and the value of the noisy encrypted bit is no longer binary. In this research the encryption techniques was evaluated and tested for applicability to encrypt and decrypt successfully. The noise performance was tested and compared. The technique was applied for image transmission over a wireless IP broadband link. Images (optical and thermal) captured from telemedicine application was transmitted and decrypted with reasonable success in this application.
Mundi, Anuj V. "PLC-WiFi hybrid broadband Internet deployment and security /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0006964.
Full textOzan, Orhan. "Denial of service attacks on 802.1X security protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOzan.pdf.
Full textJaiaree, Thoetsak. "The security aspects of wireless local area network (WLAN)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FJaiaree.pdf.
Full textThesis advisor(s): Norman F. Schneidewind, Douglas E. Brinkley. Includes bibliographical references (p. 75-78). Also available online.
Oh, Khoon Wee. "Wireless network security : design considerations for an enterprise network /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FOh.pdf.
Full textLim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.
Full textBooks on the topic "Wireless LAN Security"
How secure is your wireless network?: Safeguarding your Wi-Fi- LAN. Upper Saddle River, NJ: Prentice Hall PTR, 2004.
Find full textF, Ransome James, ed. Wireless operational security. Amsterdam: Elsevier Digital Press, 2004.
Find full textWright, Joshua. Hacking Exposed Wireless: Wireless security secrets & solutions. 2nd ed. New York, USA: McGraw-Hill, 2010.
Find full textPeikari, Cyrus. Maximum Wireless Security. Upper Saddle River: Pearson Education, 2005.
Find full textWrightson, Tyler. Wireless network security: A beginner's guide. New York: McGraw-Hill, 2012.
Find full textBook chapters on the topic "Wireless LAN Security"
Tagg, Gary L., and Jason Sinchak. "802.11 Wireless Lan Security." In Computer Security Handbook, 33.1–33.53. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch33.
Full textKsentini, A., A. Gueroui, and M. Naimi. "Adaptive AIFS in Wireless LAN." In Network Control and Engineering for QoS, Security and Mobility II, 78–89. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35703-4_6.
Full textGroß, Stephan, Sabine Lein, and Sandra Steinbrecher. "A Multilateral Secure Payment System for Wireless LAN Hotspots." In Trust, Privacy, and Security in Digital Business, 80–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11537878_9.
Full textFu, Cai, Deliang Xu, Lansheng Han, Jingfang Xu, and Zhicun Fang. "Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN." In Cyberspace Safety and Security, 429–40. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03584-0_32.
Full textKim, Kyung-jun, Hyun-sook Kim, Sang-don Lee, and Ki-jun Han. "An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN." In Security and Privacy in the Age of Ubiquitous Computing, 239–49. Boston, MA: Springer US, 2005. http://dx.doi.org/10.1007/0-387-25660-1_16.
Full textBera, P., Soumya Maity, S. K. Ghosh, and Pallab Dasgupta. "A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model." In Recent Trends in Network Security and Applications, 232–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14478-3_24.
Full textBera, P., S. K. Ghosh, and Pallab Dasgupta. "A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management." In Information Systems, Technology and Management, 76–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12035-0_9.
Full textLi, Zhou, Tan Fang-yong, and Gao Xiao-hui. "Research and Implementation of Security Wireless LANs Based on EAP-TLS and IPSec VPN." In Advances in Intelligent and Soft Computing, 103–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29637-6_14.
Full text"Wireless LAN Security." In Network and Data Security for Non-Engineers, 203–18. Boca Raton : CRC Press, Taylor & Francis Group, an Informa: Auerbach Publications, 2016. http://dx.doi.org/10.1201/9781315381138-25.
Full text"Wireless LAN Security." In Wireless Security Handbook. Auerbach Publications, 2005. http://dx.doi.org/10.1201/9781420031188.ch12.
Full textConference papers on the topic "Wireless LAN Security"
Feng, Pan. "Wireless LAN security issues and solutions." In 2012 IEEE Symposium on Robotics and Applications (ISRA). IEEE, 2012. http://dx.doi.org/10.1109/isra.2012.6219343.
Full textWaheed, Fareeha, Sadia Muhiuddin, and Saqib M. Ilyas. "Multi-Level Security for Wireless LAN." In 2005 Student Conference on Engineering Sciences and Technology. IEEE, 2005. http://dx.doi.org/10.1109/sconest.2005.4382904.
Full textNishi, Ryuzou, Yoshiaki Hori, and Kouichi Sakurai. "Secrecy Capacity of Wireless LAN." In 2009 International Conference on Availability, Reliability and Security. IEEE, 2009. http://dx.doi.org/10.1109/ares.2009.91.
Full textTao, Ping, Algis Rudys, Andrew M. Ladd, and Dan S. Wallach. "Wireless LAN location-sensing for security applications." In the 2003 ACM workshop. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/941311.941314.
Full textKouhbor, Shahnaz. "Physical Security Enhancement in Wireless LAN Systems." In 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, 2007. http://dx.doi.org/10.1109/issnip.2007.4496934.
Full textTang, Yong li, Jin Yan, Jin xia Yu, and Qian Zhao. "Research on Improved Dynamic Security LAN." In 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2011. http://dx.doi.org/10.1109/wicom.2011.6040524.
Full textLuu, Brian B., and Richard D. Gopaul. "Wireless LAN signal strength in a 3-story cinderblock building." In Defense and Security Symposium, edited by Raghuveer M. Rao, Sohail A. Dianat, and Michael D. Zoltowski. SPIE, 2006. http://dx.doi.org/10.1117/12.665101.
Full textZhuo Chang, Qiang He, Peng-Yuan Zhao, and Jin-Song Liu. "A Wireless-LAN security model based on Computer Immunology." In 2009 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2009. http://dx.doi.org/10.1109/icmlc.2009.5212158.
Full textZhengqiu, Lu, Tian Si, Wang Ming, Ye Peisong, and Chen Qingzhang. "Security analysis and recommendations for Wireless LAN 802.11b network." In 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, 2011. http://dx.doi.org/10.1109/cecnet.2011.5768358.
Full textMcHugh, Kyle, Walter Akpedeye, and Thaier Hayajneh. "Next generation wireless-LAN: Security issues and performance analysis." In 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2017. http://dx.doi.org/10.1109/ccwc.2017.7868405.
Full textReports on the topic "Wireless LAN Security"
King, J. IEEE 802.11 Wireless LAN Security White Paper. Office of Scientific and Technical Information (OSTI), October 2001. http://dx.doi.org/10.2172/15005940.
Full text