Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Wireless Network Security Spread Spectrum Techniques


Affiliations
1 Department of Computer Science & Applications, Swami Sarvanand Giri Regional Centre, Panjab University, Hoshiarpur, Punjab, India
     

   Subscribe/Renew Journal


Wireless LANs enable users to communicate without the need of wires. In this technology two or more devices use radio frequency to transfer and receive data over air. WLAN network uses a wireless Access Point (AP) to transmit and receive data from users. The major difference between wired LAN and WLAN is WLAN transmits data by using radio waves instead of transmitting electrical signals over a wire. Nowadays wireless networks are gaining popularity as one can use them in many areas such as in classrooms or in workplace due to flexibility and portability of wireless devices. Since wireless devices transmit radio signals over a wider area, so security become major concern. Anyone with proper Wi-Fi device and wireless NIC can intercept radio signals from the nearby wireless network. Therefore, it is important to enhance the network security in order to protect the information of the network. Many security protocols have been designed to protect the wireless networks. But later it has been found that theses protocols were not able to provide complete security. In this paper some of threats that can be made at physical layer and countermeasure using spread spectrum techniques are discussed.

Keywords

Security, Protocol, Threat, Spread Spectrum
Subscription Login to verify subscription
User
Notifications
Font Size


  • Beaver, K. & Peter, T. & Hacking, D. (2005). Wireless Networks for Dummies. (pp. 9-11). Wiley Publishing Inc.
  • Stallings, W. (2007). Computer Networking with Internet Protocols and Technology. (pp.555-556). Pearson Education,Inc.
  • Heather, D. (2005). Lane, Security Vulnerabilities and Wireless LAN Technology.
  • www.itsce.gov.cn/docs/20090507161931121853.pdf
  • http://searchnetworking.techtarget.com/definition/direct-sequence-spread-spectrum
  • http://searchnetworking.techtarget.com/definition/frequency-hopping-spread- spectrum
  • http://searchnetworking.techtarget.com/definition/frequency-hopping-spread-spectrum
  • http://en.wikipedia.org/wiki/Spread_spectrum
  • http://www.javvin.com/protocolWLAN.html
  • http://computer.howstuffworks.com/wireless-network1.htm
  • http://en.wikipedia.org/wiki/Direct-sequence_spread_spectrum
  • http://en.wikipedia.org/wiki/Orthogonal_frequency-division_multiplexing
  • http://www.bannerengineering.com/
  • http://www.maximintegrated.com/app-notes/index.mvp/id/1890

Abstract Views: 325

PDF Views: 4




  • Wireless Network Security Spread Spectrum Techniques

Abstract Views: 325  |  PDF Views: 4

Authors

Rajinder Singh
Department of Computer Science & Applications, Swami Sarvanand Giri Regional Centre, Panjab University, Hoshiarpur, Punjab, India

Abstract


Wireless LANs enable users to communicate without the need of wires. In this technology two or more devices use radio frequency to transfer and receive data over air. WLAN network uses a wireless Access Point (AP) to transmit and receive data from users. The major difference between wired LAN and WLAN is WLAN transmits data by using radio waves instead of transmitting electrical signals over a wire. Nowadays wireless networks are gaining popularity as one can use them in many areas such as in classrooms or in workplace due to flexibility and portability of wireless devices. Since wireless devices transmit radio signals over a wider area, so security become major concern. Anyone with proper Wi-Fi device and wireless NIC can intercept radio signals from the nearby wireless network. Therefore, it is important to enhance the network security in order to protect the information of the network. Many security protocols have been designed to protect the wireless networks. But later it has been found that theses protocols were not able to provide complete security. In this paper some of threats that can be made at physical layer and countermeasure using spread spectrum techniques are discussed.

Keywords


Security, Protocol, Threat, Spread Spectrum

References