Ground Rules of Wireless LAN Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 131 , Downloads: 115 | CTR: 88 % | Weekly Popularity: ⮙5

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016

Ground Rules of Wireless LAN Security

K. Senthamarai

Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers to be mobile, cable less and communicate with speeds close to the speeds of wired LANs. These features came with expensive price to pay in areas of security of the network. This paper identifies and summarizes these security concerns and their solutions. Broadly, security concerns in the WLAN world are classified into physical and logical. The paper overviews both physical and logical WLANs security problems followed by a review of the main technologies used to overcome them. It addresses logical security attacks like man-in-the-middle attack and Denial of Service attacks as well as physical security attacks like rouge APs. Wired Equivalent Privacy (WEP) was the first logical solution to secure WLANs. Towards perfection in securing WLANs, IEEE802.11i emerged as a new MAC layer standard which permanently fixes most of the security problems found in WEP and other temporary WLANs security solutions. This paper reviews all security solutions starting from WEP to IEEE802.11i and discusses the strength and weakness of these solutions.

Keywords: WLAN, wireless LAN, security, IEEE80211, Physical Attacks

Edition: Volume 5 Issue 3, March 2016

Pages: 1545 - 1550

Share this Article

How to Cite this Article?

K. Senthamarai, "Ground Rules of Wireless LAN Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV162196, Volume 5 Issue 3, March 2016, 1545 - 1550

131 PDF Views | 115 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'WLAN'

Views: 227 , Downloads: 150 | CTR: 66 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Views: 155 , Downloads: 103 | CTR: 66 % | Weekly Popularity: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1952 - 1955

Ultra Wideband on High Speed Wireless Personal Area Networks

A. S. Syed Navaz, G. M. Kadhar Nawaz

Share this Article

Views: 147 , Downloads: 107 | CTR: 73 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 679 - 682

Optimized Energy Conservation in WLAN Using Dynamic Sleep Scheduling

Ajesh. P. A, R. Gowthamani

Share this Article

Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2438 - 2441

STOC: Energy Cost Models of Smartphones for Task Offloading to the Cloud

Rahitha K, Gireesh T K

Share this Article

Similar Articles with Keyword 'wireless LAN'

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Views: 139 , Downloads: 103 | CTR: 74 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 846 - 851

Energy Efficient QRS Detection Method for Portable and Personal Analysis of ECG Signal Obtained from Wearable Wireless ECG Body Sensors

Prineeta Sahni, Khushneet Kaur

Share this Article

Views: 147 , Downloads: 107 | CTR: 73 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 679 - 682

Optimized Energy Conservation in WLAN Using Dynamic Sleep Scheduling

Ajesh. P. A, R. Gowthamani

Share this Article

Views: 131 , Downloads: 112 | CTR: 85 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1288 - 1291

Survey on Latest Routing Algorithms in Opportunistic Networks

Sonam Kashyap, Jasvir Singh

Share this Article

Views: 138 , Downloads: 113 | CTR: 82 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2165 - 2168

A Survey on Packet Retrieval for Three-hop Routing Protocol in Hybrid Wireless Networks

Bendre Shital U., R. P. Jadhav

Share this Article

Similar Articles with Keyword 'security'

Views: 37 , Downloads: 30 | CTR: 81 % | Weekly Popularity: ⮙16

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 165 , Downloads: 40 | CTR: 24 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 49 , Downloads: 41 | CTR: 84 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'IEEE80211'

Views: 131 , Downloads: 115 | CTR: 88 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1545 - 1550

Ground Rules of Wireless LAN Security

K. Senthamarai

Share this Article

Views: 166 , Downloads: 129 | CTR: 78 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 91 - 93

Video Streaming over IEEE 802.11e

Raja Swarna Teja, Dr. S. Vasundra

Share this Article

Similar Articles with Keyword 'Physical Attacks'

Views: 126 , Downloads: 106 | CTR: 84 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1360 - 1364

A Review on Security Challenges and Attacks in Wireless Sensor Networks

Paramjit Kour, Lal Chand Panwar

Share this Article

Views: 131 , Downloads: 115 | CTR: 88 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1545 - 1550

Ground Rules of Wireless LAN Security

K. Senthamarai

Share this Article

Views: 140 , Downloads: 117 | CTR: 84 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1045 - 1051

Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks

Umashri Karkikatti, Dr. Nalini N

Share this Article
Top