CFP last date
22 April 2024
Reseach Article

Critical Review of Security Attacks in Wireless PAN

by Dimpal, Priti Gulia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 160 - Number 1
Year of Publication: 2017
Authors: Dimpal, Priti Gulia
10.5120/ijca2017912939

Dimpal, Priti Gulia . Critical Review of Security Attacks in Wireless PAN. International Journal of Computer Applications. 160, 1 ( Feb 2017), 15-19. DOI=10.5120/ijca2017912939

@article{ 10.5120/ijca2017912939,
author = { Dimpal, Priti Gulia },
title = { Critical Review of Security Attacks in Wireless PAN },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 160 },
number = { 1 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume160/number1/27037-2017912939/ },
doi = { 10.5120/ijca2017912939 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:05:27.915388+05:30
%A Dimpal
%A Priti Gulia
%T Critical Review of Security Attacks in Wireless PAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 160
%N 1
%P 15-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless personal area network is a personal area network a network for interconnecting devices centered around an individual person's work space in which the connections are wireless. Typically, a wireless personal area network uses some technology that permits communication within about 10 meters i.e a very short range. One such technology is Bluetooth, which was used as the basis for a new standard, IEEE 802.15. The personal area network computing model allows all network computer system systems to take part within processing but at their respective ends, separately. This model allows sharing data & services but does not help other network computer system systems within processing. After that will study of Existing Security loop holes within wireless PAN based distributed network environment. The security threats are Hacker, cracker, crypto analysts, Brute Force attack , Man in Middle attack, Denial of services. In this research we will make the critical review on security loop holes of existing mechanisms. Then will create a new security mechanism to enhance security of data on wireless personal area network by customizing existing Encryption & Decryption Mechanisms. In this paper a critical review of security attack is discussed.

References
  1. IEEE 802.11 Wireless PAN Security Overview by Ahmed M. Al Naamany , Ali Al Shidhani, Hadj Bourdoucen, Department of Electrical & Computer Engineering – Sultan Qaboos University, Oman. IJCSNS International Journal of Computer Science & Network Security, VOL.6 No.5B, May 2006
  2. SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS BY DI MA UNIVERSITY OF MICHIGAN-DEARBORN, IEEE Wireless Communications October 2010
  3. Efficient Gossip Protocols for Verifying Consistency of Certificate Logs by Laurent Chuat ETH Zurich, Pawel Szalachowski ETH Zurich
  4. Attacks within Wireless Networks Yih-Chun Hu, Member, IEEE, Adrian Perrig, Member, IEEE, & David B. Johnson, Member, IEEE, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006
  5. Lightweight Hidden Services by Andriy Panchenko, Otto Spanioly, Andre Egnersy, & Thomas Engel Computer Science department, RWTH Aachen University, Germany within June 2011
  6. In 2011 PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks 36th Annual IEEE Conference on Local Computer Networks, 978-1-61284-927-0/10/$26.00 ©2011 IEEE
  7. D. K. Y. Yau, J. C. S. Lui, F. Liang, & Y. Yam, “Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles,” IEEE/ACM Trans. Netw., vol. 13, no. 1, pp. 29–42, 2005.
  8. X. Yang, D. Wetherall, & T. E. Anderson, “TVA: a DoS-limiting network architecture,” IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1267–1280, 2008.
  9. M. Sung & J. Xu, “IP traceback-based intelligent packet filtering: A novel technique for defending against internet DDoS attacks,” IEEE Trans. Parallel Distrib. Syst., vol. 14, no. 9, pp. 861–872, 2003.
  10. S. Savage, D. Wetherall, A. Karlin, & T. Anderson, “Practical Network Support for IP Traceback,” within Proc. of ACM SIGCOMM, Aug. 2000, pp.295–396.
  11. K. Park & H. Lee, “On effectiveness of route-based packet filtering for distributed DoS attack prevention within power-law internets,” within SIGCOMM, 2001, pp. 15–26.
  12. R. Braga, E. Mota, & A. Passito, “Lightweight DDoS flooding attack detection using NOX/OpenFlow,” within The 35th IEEE Conference on Local Computer Networks (LCN), 2010.
  13. D. Dean, M. K. Franklin, & A. Stubblefield, “An algebraic approach to IP traceback,” ACM Trans. Inf. Syst. Secur., vol. 5, no. 2, pp. 119–137, 2002.
  14. J. Jun, M.L. Sichitiu, "The nominal capacity of wireless networks", in IEEE Wireless Communications, vol 10, 5 pp 8-14. October 2003
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Attack Decryption Critical Analysis Equivalent