Wireless Network Security

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 38031 Experts worldwide ranked by ideXlab platform

Huang Haibin - One of the best experts on this subject based on the ideXlab platform.

  • attack analysis of 4 way handshake protocol based on 802 11i
    Computer Engineering, 2009
    Co-Authors: Huang Haibin
    Abstract:

    Aiming at the 4-way handshaking protocol defections of the new-generation Wireless Network Security standards 802.11i and the remaining attacks probably exist,this paper studies improved scheme of TPTK technology and re-Nonce.By analyzing the Security vulnerabilities of two improved schemes,a new improved design based on digital envelope technology is provided,and it is analyzed and verified.

Astuti Rachmawati Darma - One of the best experts on this subject based on the ideXlab platform.

  • OPTIMALISASI KEAMANAN Wireless MENGGUNAKAN FILTERING MAC ADDRESS: OPTIMALISASI KEAMANAN Wireless MENGGUNAKAN FILTERING MAC ADDRESS
    Jurusan Teknik Informatika Universitas Palangka Raya, 2021
    Co-Authors: Firmansyah Firmansyah, Purnama, Rachmat Adi, Astuti Rachmawati Darma
    Abstract:

    The use 802.11 Wireless-based Network services have become one of the most widely used Network services, this will be directly proportional to the Security holes that are in the Wireless Network. The rise of access rights theft in Wireless Networks is due to the large number of software and tools available on the internet to read encryption in Wireless Security. To minimize the occurrence of theft of access rights in Wireless Networks can use a layered Security system by implementing Security Hotspot login and MAC Address Filtering. This layered Wireless Network Security is able to block users who try to access the Network. This is because the Wireless Network Security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer Network. So every client who wants to connect to the internet Network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot logi

Lajos Hanzo - One of the best experts on this subject based on the ideXlab platform.

  • a survey on Wireless Security technical challenges recent advances and future trends
    Proceedings of the IEEE, 2016
    Co-Authors: Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
    Abstract:

    Due to the broadcast nature of radio propagation, the Wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired Network, where communicating devices are physically connected through cables and a node without direct association is unable to access the Network for illicit activities. The open communications environment makes Wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the Security vulnerabilities and threats imposed by the inherent open nature of Wireless communications and to devise efficient defense mechanisms for improving the Wireless Network Security. We first summarize the Security requirements of Wireless Networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of Security attacks encountered in Wireless Networks is presented in view of the Network protocol architecture, where the potential Security threats are discussed at each protocol layer. We also provide a survey of the existing Security protocols and algorithms that are adopted in the existing Wireless Network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer Security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer Security techniques are reviewed and compared, including information-theoretic Security, artificial-noise-aided Security, Security-oriented beamforming, diversity-assisted Security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate Wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer Security into existing authentication and cryptography mechanisms for further securing Wireless Networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in Wireless Security are discussed.

  • a survey on Wireless Security technical challenges recent advances and future trends
    arXiv: Information Theory, 2016
    Co-Authors: Xianbin Wang, Lajos Hanzo
    Abstract:

    Due to the broadcast nature of radio propagation, the Wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired Network, where communicating devices are physically connected through cables and a node without direct association is unable to access the Network for illicit activities. The open communications environment makes Wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the Security vulnerabilities and threats imposed by the inherent open nature of Wireless communications and to devise efficient defense mechanisms for improving the Wireless Network Security. We first summarize the Security requirements of Wireless Networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of Security attacks encountered in Wireless Networks is presented in view of the Network protocol architecture, where the potential Security threats are discussed at each protocol layer. We also provide a survey of the existing Security protocols and algorithms that are adopted in the existing Wireless Network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer Security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer Security techniques are reviewed and compared, including information-theoretic Security, artificial-noise-aided Security, Security-oriented beamforming, diversity-assisted Security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate Wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer Security into existing authentication and cryptography mechanisms for further securing Wireless Networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in Wireless Security are discussed.

  • a survey on Wireless Security technical challenges recent advances and future trends
    arXiv: Information Theory, 2015
    Co-Authors: Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
    Abstract:

    This paper examines the Security vulnerabilities and threats imposed by the inherent open nature of Wireless communications and to devise efficient defense mechanisms for improving the Wireless Network Security. We first summarize the Security requirements of Wireless Networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of Security attacks encountered in Wireless Networks is presented in view of the Network protocol architecture, where the potential Security threats are discussed at each protocol layer. We also provide a survey of the existing Security protocols and algorithms that are adopted in the existing Wireless Network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer Security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer Security into existing authentication and cryptography mechanisms for further securing Wireless Networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in Wireless Security are discussed.

Ubsi, Rachmat Adi - Purnama - One of the best experts on this subject based on the ideXlab platform.

  • Optimalisasi Keamanan Jaringan Wireless Menggunakan Firewall Filtering MAC Address
    APMMI - Asosiasi Profesi Multimedia Indonesia, 2019
    Co-Authors: Ubsi, Rachmat Adi - Purnama
    Abstract:

    Abstrak – Penggunaan layanan jaringan nirkabel 802.11 semakin meningkat, hal ini akan berbanding lurus dengan celah keamanan yang digunakan. Marak terjadinya pencurian dan kebobolan hak akses didalam Wireless dikarenakan banyaknya tools yang mudah didapat didalam jaringan internet. Dengan menggunakan keamanan jaringan Wireless model WEP/WPA2 yang hanya menerapkan single login untuk melakukan akses kini sudah mudah dibobol, penggunaan keamanan jaringan Wireless model Hotspot Login yang melakukan verifikasi terhadap user dan password pun sudah rentan dengan kebobolan hak aksesnya. Untuk meminimalisir terjadinya kebobolan hak akses, penulis menerapkan optimalisasi keamanan jaringan Wireless menggunakan metode firewall rule. Metode ini akan melakukan filtering hak akses berdasarkan MAC Address perangkat yang akan terhubung kedalam jaringan. Jadi jika terdapat user yang mencoba melakukan akses kedalam jaringan namun MAC Address dari perangkat tersebut tidak didaftarkan maka perangkat tersebut tidak akan terkoneksi kedalam jaringan internet. Setiap perangkat yang ingin terhubung kedalam jaringan internet harus didaftarkan MAC Addressnya terlebih dahulu. Kata Kunci:Filtering, MAC Address, Firewall Rule, Wireless Abstract - The use of 802.11 Wireless Network services is increasing, this will be directly proportional to the Security gap used. The occurrence of theft and conceding access rights in Wireless due to the many tools that are easily available on the internet Network. By using Wireless Network Security, the WEP / WPA2 model that only applies a single login to access is now easy to break into, the use of Wireless Network Security Hotspot Login model that verifies users and passwords is already vulnerable to access rights. To minimize the occurrence of conceding access rights, the author applies the optimization of Wireless Network Security using the firewall rule method. This method will filter the access rights based on the MAC Address of the device to be connected to the Network. So if there is a user who tries to access the Network but the MAC Address of the device is not registered, the device will not be connected to the internet Network. Every device that wants to be connected to the internet Network must be registered with the MAC Address first. Keywords: Filtering, MAC Address, Firewall Rule, Wireles

Zhu Han - One of the best experts on this subject based on the ideXlab platform.

  • Applications of Economic and Pricing Models for Wireless Network Security: A Survey
    IEEE Communications Surveys & Tutorials, 2017
    Co-Authors: Nguyen Cong Luong, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Zhu Han
    Abstract:

    This paper provides a comprehensive literature review on applications of economic and pricing theory to Security issues in Wireless Networks. Unlike wireline Networks, the broadcast nature and the highly dynamic change of Network environments pose a number of nontrivial challenges to Security design in Wireless Networks. While the Security issues have not been completely solved by traditional or system-based solutions, economic and pricing models recently were employed as one efficient solution to discourage attackers and prevent attacks to be performed. In this paper, we review economic and pricing approaches proposed to address major Security issues in Wireless Networks including eavesdropping attack, denial-of-service (DoS) attack such as jamming and distributed DoS, and illegitimate behaviors of malicious users. Additionally, we discuss integrating economic and pricing models with cryptography methods to reduce information privacy leakage as well as to guarantee the confidentiality and integrity of information in Wireless Networks. Finally, we highlight important challenges, open issues and future research directions of applying economic and pricing models to Wireless Security issues.