Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) and WPA (Wireless Fidelity Protected Access) have been proposed in this paper. Both of these conventions are by large used to scramble the present information and data preventing unapproved clients and Wireless Fidelity (Wi-Fi) programmers from decoding the information and hacking the Wi-Fi systems. Anybody within the range of the Wireless Fidelity system can connect to it with the help the Access Point (AP). In addition the Universal Mobile Telecommunications System (UMTS) system is contrasted with Wi-Fi Network for better execution in security.
Published in | American Journal of Operations Management and Information Systems (Volume 2, Issue 1) |
DOI | 10.11648/j.ajomis.20170201.11 |
Page(s) | 1-4 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
Wi-Fi, WEP, WPA, WLAN, AP, UMTS, WSA, ICE
[1] | Djabri Fahed and Rongke Liu (2013), “WiFi-Based Localization in Dynamic Indoor Environment Using a Dynamic Neural Network”, International Journal of Machine Learning and Computing, Vol. 3, No. 1. |
[2] | Gints Jekabsons, Vadim Kairish et al. (2011), “An Analysis of Wi-Fi Based Indoor Positioning Accuracy”, Scientific Journal of Riga Technical University Computer Science. Applied Computer Systems, Vol. 47. |
[3] | Jiangfan Feng, Yanhong Liu (2012), “Wi-Fibased Indoor Navigation with Mobile GIS and Speech Recognition”, IJCSI International Journal of Computer Science Issues, Vol. 9, No. 6, pp. 1694-0814. |
[4] | Kihun Kim, Younghyun Kim, Sangheon Pack and Nakjung Choi (2011), “An SNR-based Admission Control Scheme in Wi-Fi Based Vehicular Networks”, EURASIP Journal on Wireless Communications and Networking. |
[5] | Beck, M., Tews, E.: Practical Attacks against WEP and WPA. In: Proc. 2009 Second ACM Conference on Wireless network Security (Wisec) 2009. |
[6] | Sriram, V. S. S, Sahoo, G., Agawal, K.K.: Detecting and Eliminating Rouge Access Points in IEEE-802.11 WLAN–A MultiAgent Sourcing Agent Methodology. Birla Institute of Technology, India (2010). |
[7] | P. Feng, Wireless LAN security issues and solutions, IEEE Symposium on the Robotics and Applications (ISRA), 2012. |
[8] | Panigrahy, S. K, Jena, S. K, Turuk, A. K.: Security in Bluetooth, RFID and Wireless Sensor Network. In: Proc. 2011 ICCCS’11, India (2011). |
[9] | Andrew A. Vladimirov, Konstantin V. Gavrilenko and Andrei A. Mikhailovsky: Wi-Foo: The Secrets of Wireless Hacking, Pearson / Addison Wesley (2004). |
[10] | G. A. Mendez, L. C. D. Silva &A. Punchihewa, Review of Present IEEE 802.11 “Wi-Fi” Security Issues and of Other Possible Vulnerabilities, Institute of Information Sciences & Technology, Massey University, New Zealand. |
[11] | J. S. Park & D. Dicoi, WLAN security: current and future. IEEE Internet Computing, 7(5), 2003, 60-65. |
APA Style
Alex Roney Mathew, Aayad Al Hajj. (2017). Wireless Network Security Threats, Vulnerabilities and Their Defences. American Journal of Operations Management and Information Systems, 2(1), 1-4. https://doi.org/10.11648/j.ajomis.20170201.11
ACS Style
Alex Roney Mathew; Aayad Al Hajj. Wireless Network Security Threats, Vulnerabilities and Their Defences. Am. J. Oper. Manag. Inf. Syst. 2017, 2(1), 1-4. doi: 10.11648/j.ajomis.20170201.11
@article{10.11648/j.ajomis.20170201.11, author = {Alex Roney Mathew and Aayad Al Hajj}, title = {Wireless Network Security Threats, Vulnerabilities and Their Defences}, journal = {American Journal of Operations Management and Information Systems}, volume = {2}, number = {1}, pages = {1-4}, doi = {10.11648/j.ajomis.20170201.11}, url = {https://doi.org/10.11648/j.ajomis.20170201.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajomis.20170201.11}, abstract = {Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) and WPA (Wireless Fidelity Protected Access) have been proposed in this paper. Both of these conventions are by large used to scramble the present information and data preventing unapproved clients and Wireless Fidelity (Wi-Fi) programmers from decoding the information and hacking the Wi-Fi systems. Anybody within the range of the Wireless Fidelity system can connect to it with the help the Access Point (AP). In addition the Universal Mobile Telecommunications System (UMTS) system is contrasted with Wi-Fi Network for better execution in security.}, year = {2017} }
TY - JOUR T1 - Wireless Network Security Threats, Vulnerabilities and Their Defences AU - Alex Roney Mathew AU - Aayad Al Hajj Y1 - 2017/01/03 PY - 2017 N1 - https://doi.org/10.11648/j.ajomis.20170201.11 DO - 10.11648/j.ajomis.20170201.11 T2 - American Journal of Operations Management and Information Systems JF - American Journal of Operations Management and Information Systems JO - American Journal of Operations Management and Information Systems SP - 1 EP - 4 PB - Science Publishing Group SN - 2578-8310 UR - https://doi.org/10.11648/j.ajomis.20170201.11 AB - Interchanges through PCs, laptops, tablets, and mobiles nowadays triggered the spread of remote systems administration to reach high levels throughout the globe. Security issues have risen considerably in Wi-Fi systems due to the unapproved clients and Wi-Fi programmers. Thus to eliminate conceivable security issues, WEP (Wired Equivalent Privacy) and WPA (Wireless Fidelity Protected Access) have been proposed in this paper. Both of these conventions are by large used to scramble the present information and data preventing unapproved clients and Wireless Fidelity (Wi-Fi) programmers from decoding the information and hacking the Wi-Fi systems. Anybody within the range of the Wireless Fidelity system can connect to it with the help the Access Point (AP). In addition the Universal Mobile Telecommunications System (UMTS) system is contrasted with Wi-Fi Network for better execution in security. VL - 2 IS - 1 ER -