International Journal of Applied Information Systems |
Foundation of Computer Science (FCS), NY, USA |
Volume 2 - Number 1 |
Year of Publication: 2012 |
Authors: Kuljeet Kaur |
10.5120/ijais12-450249 |
Kuljeet Kaur . Technologies to Overcome from Intimidation of Wireless Network Security. International Journal of Applied Information Systems. 2, 1 ( May 2012), 25-29. DOI=10.5120/ijais12-450249
Inbuilt physical security in wireless networks is not obtainable and unfortunately these are more prone to attacks from intruders. Resources are easily accessible, once an unauthorized access is gained. Paper elucidates numerous attacks which an intruder could use to detect and connect to the wireless network. Focus of the paper is on two technologies Wired Equivalent Privacy (WEP) and IEEE 802. 1X Authentication which would secure wireless network from unauthorized access or intimidation. Complete process and authentication components used by WEP and IEEE 802. 1X are elaborated in the paper. Detailed understanding for the client is generated in the paper for planning the wireless security. Paper analyzes the pros and cons of WEP and IEEE 802. 1X and suggests the best practices for securing wireless networks. I have tried to generate an idea that how wireless security could be enhanced through this paper and best practices are also suggested by me