Open Access   Article Go Back

Wireless Security Network Using Authentication and Encryption

M. Dukitha1 , G. Sheeba2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-17 , Page no. 109-112, May-2019

Online published on May 22, 2019

Copyright © M. Dukitha, G. Sheeba . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Dukitha, G. Sheeba, “Wireless Security Network Using Authentication and Encryption,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.17, pp.109-112, 2019.

MLA Style Citation: M. Dukitha, G. Sheeba "Wireless Security Network Using Authentication and Encryption." International Journal of Computer Sciences and Engineering 07.17 (2019): 109-112.

APA Style Citation: M. Dukitha, G. Sheeba, (2019). Wireless Security Network Using Authentication and Encryption. International Journal of Computer Sciences and Engineering, 07(17), 109-112.

BibTex Style Citation:
@article{Dukitha_2019,
author = {M. Dukitha, G. Sheeba},
title = {Wireless Security Network Using Authentication and Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {17},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {109-112},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1323},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1323
TI - Wireless Security Network Using Authentication and Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - M. Dukitha, G. Sheeba
PY - 2019
DA - 2019/05/22
PB - IJCSE, Indore, INDIA
SP - 109-112
IS - 17
VL - 07
SN - 2347-2693
ER -

           

Abstract

The 21th Century is defined by human scientific breakthroughs. One of them is the global use of the Internet. Almost every educated person nowadays knows more or less about the internet. Thereby, a large percentage of the human populations make use of the internet on a daily basis. Wireless internet access is thereby made affordable and accessible for everyone and that has boosted human communication and economy development into a new era. However, along with benefits, wireless internet access also possesses several risks and threats of security. The Internet has become a fertile land for criminals of all kinds to operate. Most of the time what they try to take is personal information, some of them of extreme values and sensitivity, from naive and unaware users. In that sense, a comprehensive study on how cybercriminal carry out their attacks and how to avoid and actually prevent such attacks if possible would be beneficial for the righteous netizens.

Key-Words / Index Term

Wireless, WLAN, Security, Internet, Protection, Cyber threats

References

[I] Peter Rysavy, "Secure Wireless Networking Using SSL VPNs," Rysavy Research, [© 2005 Aventail Corp. All rights reserved. Aventail Corporation, 808 Howell St., Second Floor, Seattle, WA 98101], Rysavy Research, PO Box 680, Hood River, OR 97031U.S.A., 2005
[2] Robert Whitely, Stan Schatt and Benjamin Gray."SSL Is the Future of Remote Access VPNs," © 1997-2005, Forrester Research, Inc. All rights reserved. Forrester Research, Inc., 400 Technology Square, Cambridge, MA 02139, USA), June, 2004.
[3] Fred Sandsmark, "Securing Wireless Networks," Copyright © 2005 Cisco Systems, Inc. All rights reserved. Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134, USA [iQ Magazine (vil. VI,No. 1)., 2005.
[4] Jupitermedia Headquarters, Jupiter Research, 23 Old Kings Highway South, Darien, CT 06820, 2005.
[5] Scott Robinson, "Strengthen Your Wireless Security By Avoiding These Missteps," Copyright ©2005 CNET Networks, Inc. All rights reserved. TechRepublic, 235 Second Street, San Francisco, CA 94105, 2005.
[6] "End Point Control: Secure Anywhere Access With Reduced Risk And Increased IT Control," © 2004 Aventail Corp. All rights reserved. Aventail Corporation, 808 Howell St., Second Floor, Seattle, WA 98101, 2004.
[7] John R. Vacca, Firewalls : Jumpstart for Network and Systems Administrators, Digital Press, 2004.
[8] John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill, 2001.
[9] John R. Vacca, The Essential Guide To Storage Area Networks, Prentice Hall, 2002.
[10] John R. Vacca, Wireless Data Demystified (Mcgraw-Hill Demystified Series) (Paperback)s, McGraw-Hill Professional, 2003.