CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Analytical Study of Security Threats of Wireless Networks

Published on November 2013 by K. P Singh, Gaurav Kumar, Abhay N. Tripathi
8th National Conference on Next generation Computing Technologies and Applications
Foundation of Computer Science USA
NGCTA - Number 1
November 2013
Authors: K. P Singh, Gaurav Kumar, Abhay N. Tripathi
a0cece3b-5256-4dd7-8b6d-f80d8a0ac7ab

K. P Singh, Gaurav Kumar, Abhay N. Tripathi . Analytical Study of Security Threats of Wireless Networks. 8th National Conference on Next generation Computing Technologies and Applications. NGCTA, 1 (November 2013), 17-20.

@article{
author = { K. P Singh, Gaurav Kumar, Abhay N. Tripathi },
title = { Analytical Study of Security Threats of Wireless Networks },
journal = { 8th National Conference on Next generation Computing Technologies and Applications },
issue_date = { November 2013 },
volume = { NGCTA },
number = { 1 },
month = { November },
year = { 2013 },
issn = 0975-8887,
pages = { 17-20 },
numpages = 4,
url = { /proceedings/ngcta/number1/14192-1306/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 8th National Conference on Next generation Computing Technologies and Applications
%A K. P Singh
%A Gaurav Kumar
%A Abhay N. Tripathi
%T Analytical Study of Security Threats of Wireless Networks
%J 8th National Conference on Next generation Computing Technologies and Applications
%@ 0975-8887
%V NGCTA
%N 1
%P 17-20
%D 2013
%I International Journal of Computer Applications
Abstract

The Wireless Technology has become indispensible and integral part of our lives. Lots of services are provided using various applications available through wireless network. Due to its characteristics and nature the wireless network is more vulnerable in terms of security threats. The wireless network is heterogeneous and widespread by interconnecting different types of networks services, information, persons, and transactions. For intruder it can be easily targeted for security breach. In this paper we are putting in our efforts to analyze various security threats available for wireless network and its level of severity based on damage done to either user or infrastructure.

References
  1. Network Security Fundamentals, By Gert DeLaet, Gert Schauwers, Published Sep 8, 2004 by Cisco Press.
  2. Security Threats and Risk Mitigation in a Retail Network Environment, Columbitech White Paper February 2008.
  3. Swati Sukhija, Shilpi Gupta, " Wireless Network Security Protocols A Comparative Study, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 1, January 2012.
  4. A Dr. G. Padmavathi, Mrs. D. Shanmugapriya, "Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks" International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009.
  5. Arockiam . L. and Vani . B, ?A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network, International Journal on Computer Science and Engineering, Vol. 02, No. 05, pp. 1563-1571, 2010.
  6. Arunesh Mishra, William, A. Arbaugh, ?An Initial Security Analysis of The IEEE 802. 1X Standard?, University of Maryland, Department of Computer Science and University of Maryland Institute for Advanced Computer Studies Technical Report CS-T R-4328 and UMIACS-TR-2002-10 6 February 2002.
  7. Microsoft Technet Library, How 802. 11 Wireless Works, Technical Reference, Available: http://technet. microsoft. com/en-us/library/cc757419(WS. 10). aspx.
  8. Tom Karygiannis, Les Owens, "Wireless Network Security 802. 11, Bluetooth and Handheld Devices, National Institute of Standards and Technology, Technology Administration, U. S. Department of Commerce, Special Publication 800-48.
  9. Gast, Matthew. 802. 11 Wireless Networks: The Definitive Guide, Second Edition. Sebastapol, CA: O'Reilly & Associates, Inc. , 2005.
  10. Min-kyu Choi, Rosslin John Robles, Chang-hwa Hong, Tai-hoon Kim, "Wireless Network Security: Vulnerabilities, Threats and Countermeasures", International Journal of Multimedia and Ubiquitous Engineering Vol. 3, No. 3, July, 2008.
  11. http://en. wikipedia. org/wiki/Wireless_security.
  12. http://www. sans. edu/research/security-laboratory/article/wireless-security1/.
  13. http://www. ciscopress. com/articles/article. asp?p=177383&seqNum=5.
  14. http://searchsecurity. techtarget. com/feature/A-list-of-wireless-network-attacks.
  15. http://www. esecurityplanet. com/views/article. php/3869221/Top-Ten-WiFi-SecurityThreats. htm.
  16. http://www. posdata. com/article-wireless-services. html.
  17. http://www. cisco. com/cisco/web/solutions/small_business/resource_center/articles/work_from_anywhere/why_go_wireless/index. html
  18. http://kbserver. netgear. com/kb_web_files/N100688. asp.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Networks Security Threats Ciaas Pentagon Attack Severity Scale Types Of Security Attacks Confidentiality Authentication Integrity Secrecy Availability.