The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
WLAN Security Management
Abstract
In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003). The fast development of wireless technologies implies that wireless communications will become ubiquitous in homes, offices, and enterprises. In order to conserve power and frequency spectrum, the wireless device computation overhead is most often reduced. The conventional security design thus uses smaller keys, weak message integrity protocols, and weak or one-way authentication protocols (Hardjono & Dondeti, 2005). WLAN security thus requires a more reliable protection of data communication between WLAN units and strong access management mechanisms.
Related Content
Nithin Kalorth, Vidya Deshpande.
© 2024.
7 pages.
|
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane.
© 2024.
24 pages.
|
T.S. Sujith.
© 2024.
13 pages.
|
C. Suganya, M. Vijayakumar.
© 2024.
11 pages.
|
B. Harry, Vijayakumar Muthusamy.
© 2024.
19 pages.
|
Munise Hayrun Sağlam, Ibrahim Kirçova.
© 2024.
19 pages.
|
Elif Karakoç Keskin.
© 2024.
19 pages.
|
|
|