Open Access
Subscription Access
Open Access
Subscription Access
Survey on Network Security in WI-FI Technology
Subscribe/Renew Journal
Wi-Fi is an ellipsis for Wireless Fidelity encompasses a number of standards that enable computers and other devices to connect wirelessly to local area networks and also to the internet through (WISP) Wireless Internet Service Providers. Wireless Data Transmissions including various applications such as Packet Radio, Wireless Local Area Networks, Wireless Local Loop, Free Space Optics, Satellite Transmission etc. Wi-Fi uses both single carrier Direct Sequence Spread Spectrum radio technology (DSSS) and multi-carrier Orthogonal Frequency Division Multiplexing radio technology (OFDM). Two communication protocol standards such as Bluetooth and IEEE 802.11 (Wi-Fi) are classified a physical layer and a MAC layer for wireless communications within a short range (from a few meters up to 100 meters) with low power consumption (from less than 1 mW up to 100 mW). Bluetooth is slanting to connecting close devices, plateful as a proxy for cables, while Wi-Fi is leaning towards computer-to-computer connections, as a conservatory of before exchange for cabled LANs. Wi-Fi hysterics in a family of principles urban under the IEEE. The 802.11 standard is a relation of specifications for wireless local area networks (WLAN’s). The 802.11 standard addresses communication between devices over infrared and radio frequency (RF) transmissions. Wireless networks are different than a physical-wired network. To join a physical network, one must have physical access to the network in order to connect to it.
Therefore, physical security plays a significant role in authenticating users in physical network. Wireless networks, on the other hand, do not stay neatly contained within the walls of a building-who’s allowed on a WLAN is handled through authentication. The radio waves appear in the street where transmissions from wireless LANs can be monitored by an eavesdropper with suitable available technology. This is called Eavesdropping in Wi-Fi. This can be avoided by allowing the devices trying to connect only through authentication. In this paper we offer an overview of these popular wireless communication standards, comparing their main features and behaviors in terms of various metrics.
Therefore, physical security plays a significant role in authenticating users in physical network. Wireless networks, on the other hand, do not stay neatly contained within the walls of a building-who’s allowed on a WLAN is handled through authentication. The radio waves appear in the street where transmissions from wireless LANs can be monitored by an eavesdropper with suitable available technology. This is called Eavesdropping in Wi-Fi. This can be avoided by allowing the devices trying to connect only through authentication. In this paper we offer an overview of these popular wireless communication standards, comparing their main features and behaviors in terms of various metrics.
Keywords
LAN Architecture, Authentication, Security Model, Eavesdropping.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 207
PDF Views: 2