Affiliation:
1. University of Petroleum and Energy Studies, India
Abstract
The network has become portable as a result of digital modulation, adaptive modulation, information compression, wireless access, and multiplexing. Wireless devices connected to the internet can possess a serious risk to the information security. These devices communicate among themselves in a public domain which is very easily susceptible to attacks. These devices only depend upon the encryption and their shared keys to help them mitigate the risk when data is in transit. Also WEP/WPA (wired equivalent privacy/ wireless protected access) cracking tools are taken care to avoid break into attacks. Several wireless networks, their security features, threats, and countermeasures to keep the network secure are all covered in this chapter. It analyses various wireless encryption techniques, highlighting their advantages and disadvantages. The chapter also explores wireless network attack techniques and provides countermeasures to safeguard the information systems and also provide a wireless penetration testing framework for safeguarding the wireless network.
Reference18 articles.
1. Goodput enhanced digital image watermarking scheme based on DWT and SVD.;A.Agarwal;International Journal of Application or Innovation in Engineering & Management,2013
2. Baharudin, N., Ali, F. H. M., Darus, M. Y., & Awang, N. (2015, August). Wireless intruder detection system (wids) in detecting de-authentication and disassociation attacks in ieee 802.11. In 2015 5th International Conference on IT Convergence and Security (ICITCS) (pp. 1-5). IEEE.
3. A security solution for the transmission of confidential data and efficient file authentication based on DES, AES, DSS and RSA.;R.Chaudhary;International Journal of Innovative Technology and Exploring Engineering,2012
4. Ethical hacking of wireless networks in kali linux environment.;P.Čisar;Annals of the Faculty of Engineering Hunedoara,2018
5. Perceived discrimination and well-being among unauthorized Hispanic immigrants: The moderating role of ethnic/racial group identity centrality.