Article,

A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY

.
IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 20-28 (January 2019)1. Khidir, M. and Ali, A. (2011).A Comparative Study of Authentication Methods for Wi-Fi Networks. In: Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks Online, pp. 190-194. 2. Sheila, F., Bernard, E., Les, O., Karen, S.(2007). Establishing Wireless Robust security Networks: A Guide to IEEE 802.11i, NIST.US. 3. Kwang-Hyun, B., Sean, W. and David, K. (2004). A Survey of WPA and 802.11i RSN Authentication Protocols. Dartmouth College: Computer Science Technial Report TR2004-524. Available at: www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf 4. Borisov,N. , Goldberg,I. and Wagner, D.(2001). Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy: ACM Press. 5. Yizhan, S. (2006). Complexity of System Configuration Management, PhD thesis, Tufts University..
DOI: doi://10.26562/IJIRIS.2019.JAIS10082

Abstract

This paper presents various security features and configurations commonly implemented in WLANs and their aggregated security levels and then proposes a model that enables implementation and evaluation of WLAN security.

Tags

Users

  • @ijiris

Comments and Reviews