oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
A New Method Against DoS Attacks of EAP Frames in IEEE802.11i
Akram Salehpour
Majlesi Journal of Electrical Engineering , 2008, DOI: 10.1234/mjee.v2i4.138
Abstract: IEEE 802.11i Sandard have good privacy, integrity and authentication and good management key. However this standard dos not really mention about accessability and protection of management and control frame, so it is vulnerable again DoS attacks and allow a hacker to play different attacks. One type of this threat is due to EAP fames which make heavy traffic on network, and cause blocking server or legal user. In this paper we review attacks due these frames, and we present good way to deal with these attacks.
TCP over IEEE 802.11  [PDF]
P. Chenna Reddy
Annals. Computer Science Series , 2009,
Abstract: IEEE 802.11 is a widely used wireless LAN standard for medium access control. TCP is a prominent transport protocol originally designed for wired networks. TCP treats packet loss as congestion and reduces the data rate. In wireless networks packets are lost not only due to congestion but also due to various other reasons. Hence there is need for making TCP adaptable to wireless networks. Various parameters of TCP and IEEE 802.11 can be set to appropriate values to achieve optimum performance results. In this paper optimum values for various parameters of IEEE 802.11 are determined. Network simulator NS2 is used for simulation.
TCP over IEEE 802.11  [PDF]
P. Chenna Reddy
Computer Science , 2012,
Abstract: IEEE 802.11 is a widely used wireless LAN standard for medium access control. TCP is a prominent transport protocol originally designed for wired networks. TCP treats packet loss as congestion and reduces the data rate. In wireless networks packets are lost not only due to congestion but also due to various other reasons. Hence there is need for making TCP adaptable to wireless networks. Various parameters of TCP and IEEE 802.11 can be set to appropriate values to achieve optimum performance results. In this paper optimum values for various parameters of IEEE 802.11 are determined. Network simulator NS2 is used for simulation.
Enhanced 4-way Handshake Process in IEEE802.11i with Cookies  [cached]
Hemraj Saini,Kapil Dev Sharma,Pankaj Dadheech,Tarini charan Panda
International Journal of Information and Network Security (IJINS) , 2013, DOI: 10.11591/ijins.v2i3.2088
Abstract: In today’s fast online information processing era, it is mandatory to deal with the security issues in the computer networks. WiFi Protected Access (WPA), IEEE802.11i, Data Encryption Standard (DES), Advanced Encryption Standard (AES) are used to achieve better security. The paper deals to explain and avoid the two types of attacks, Denial of Service (DoS) and Memory Exhaustion (ME), generated during the 4-way handshake process used for connection establishment over IEEE802.11i. Some amendments in 4-way handshake process are made to reduce these types of attacks. An enhanced 4-way Handshake Process over IEEE802.11i with Cookies Implementation is proposed with discussion. Finally, a conclusion and future work is provided with an exhausted result discussion and analysis of the work.
Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2014, DOI: 10.4236/ijcns.2014.79038
Abstract: Evaluation of IEEE 802.11 Mobile Ad Hoc Networks (MANET) security issues becomes significant concern for researchers since Denial of Service (DoS) attacks are recognized as one of the most harmful threats. A variety of security mechanisms are proposed to solve security dilemma in MANETs against different layers of DoS attacks. Physical Layer jamming attacks exhaust the victim’s network resources such as bandwidth, computing power, battery, etc. Unified Security Mechanism (USM) and Rate Adaptation Scheme (RAS) are two of the proposed methods by researchers against DoS attacks. USM and RAS mechanisms are simulated through OPNET simulator and Jamming Attack is generated on the network for each security mechanisms to compare specific performance metrics on the network.
Research on IEEE 802.11 wireless local area networks standards
IEEE 802.11无线局域网标准研究*

LI Hao,GAO Ze-hua,GAO Feng,ZHAO Rong-huac,
李浩
,高泽华,高峰,赵荣华c

计算机应用研究 , 2009,
Abstract: This paper introduced all the IEEE 802.11 series standards, and researched their developing histories and relations. Established the layer model of the IEEE 802.11 series standards. Researched and analyzed ordinary standards such as IEEE 802.11, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and IEEE 802.11n, especially their corresponding technologies on physical layer and media access layer.
Performance comparison of IEEE 802.11g and IEEE 802.11n in the presence of interference from 802.15.4 networks  [PDF]
Syed Haani Masood
Computer Science , 2013,
Abstract: In this paper we compare the packet error rate (PER) and maximum throughput of IEEE 802.11n and IEEE 802.11g under interference from IEEE 802.15.4 by using MATLAB to simulate the IEEE PHY for 802.11n and 802.11g networks.
Throughput Limits of IEEE 802.11 and IEEE 802.15.3  [PDF]
Sana Ullah,Yingji Zhong,S. M. Riazul Islam,Ahasanun Nessa,Kyung Sup Kwak
Computer Science , 2009, DOI: 10.1109/WiCom.2008.731
Abstract: IEEE 802.11 and IEEE 802.15.3 are wireless standards originally designed for wireless local area network (WLAN) and wireless personal area network (WPAN). This paper studies MAC throughput analysis of both standards. We present a comparative analysis of both standards in terms of MAC throughput and bandwidth efficiency. Numerical results show that the performance of IEEE 802.15.3 transcends IEEE 802.11 in all cases.
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis  [PDF]
Praveen Likhar,Ravi Shankar Yadav,Keshava Rao M
International Journal of Network Security & Its Applications , 2011,
Abstract: Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of greatconcern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdropping becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper presents an approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE 802.11g WLAN.
Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis  [PDF]
Praveen Likhar,Ravi Shankar Yadav,Keshava Rao M
Computer Science , 2012, DOI: 10.5121/ijnsa.2011.3607
Abstract: Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdropping becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper presents an approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE 802.11g WLAN.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.